Cyberspace -- Government policy -- United StatesSee also what's at your library, or elsewhere.
Broader terms:Narrower term: |
Filed under: Cyberspace -- Government policy -- United States The national strategy to secure cyberspace. ([Dept. of Homeland Security?], 2003), by United States. Dept. of Homeland Security (page images at HathiTrust) Agency response to cyberspace policy review : joint hearing before the Subcommittee on Technology and Innovation and the Subcommittee on Research and Science Education, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, June 16, 2009. (U.S. G.P.O. :, 2010), by United States. Congress. House. Committee on Science and Technology (2007-2011). Subcommittee on Technology and Innovation and United States. Congress. House. Committee on Science and Technology (2007-2011). Subcommittee on Research and Science Education (page images at HathiTrust) Operating in the digital domain : organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. (U.S. G.P.O. :, 2010), by Unconventional Threats United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism (page images at HathiTrust) What should the Department of Defense's role in cyber be? : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held February 11, 2011. (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) The status of United States strategic forces : hearing before the Subcommittee on Strategic Forces of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held March 16, 2010. (U.S. G.P.O. :, 2010), by United States. Congress. House. Committee on Armed Services. Strategic Forces Subcommittee (page images at HathiTrust) US Cyber Command (U.S. G.P.O. :, 2010), by United States House Committee on Armed Services (page images at HathiTrust) Budget request for information technology and cyber operations programs (U.S. G.P.O. :, 2012), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Improving management and acquisition of information technology systems in the Department of Defense : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held April 6, 2011. (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Budget request for U.S. Cyber Command (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) The World Wide Web of war (U.S. Army War College, 2006), by Craig A. Smith and Army War College (U.S.) (page images at HathiTrust) Data retention as a tool for investigating Internet child pornography and other Internet crimes : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, January 25, 2011 (U.S. G.P.O. :, 2011), by Terrorism United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
Filed under: Cyberspace -- Security measures -- Government policy -- United States Improving military capabilities for cyber operations ([Washington, D.C.] : For sale by the Superintendent of Documents, U.S. G.P.O., 2013), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Modernization and policy issues in a changing national security environment (Washington : U.S. Government Printing Office, 2014, 2014), by Emerging Threats and Capabilities United States. Congress. House. Committee on Armed Services. Subcommittee on Intelligence (page images at HathiTrust) The role of small businesses in strengthening cybersecurity efforts in the United States : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Twelfth Congress, first session, July 25, 2011 (U.S. G.P.O. :, 2012), by United States. Congress. Senate. Committee on Small Business and Entrepreneurship (page images at HathiTrust)
Items below (if any) are from related and broader terms.
Filed under: Cyberspace -- Government policy
Filed under: Cyberspace -- Government policy -- Asia
Filed under: Cyberspace -- United States
Filed under: Cyberspace -- Security measures -- United States Operating in the digital domain : organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. (U.S. G.P.O. :, 2010), by Unconventional Threats United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism (page images at HathiTrust) What should the Department of Defense's role in cyber be? : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held February 11, 2011. (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) US Cyber Command (U.S. G.P.O. :, 2010), by United States House Committee on Armed Services (page images at HathiTrust) Budget request for information technology and cyber operations programs (U.S. G.P.O. :, 2012), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Improving management and acquisition of information technology systems in the Department of Defense : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held April 6, 2011. (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Budget request for U.S. Cyber Command (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust) Cyberspace as a warfighting domain : policy, management, and technical challenges to mission assurance : hearing before the Terrorism, Unconventional Threats, and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, first session, hearing held May 5, 2009. (U.S. G.P.O. :, 2010), by Unconventional Threats United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism (page images at HathiTrust) Examining the Homeland Security impact of the Obama administration's cybersecurity proposal : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, June 24, 2011 (U.S. G.P.O. :, 2012), by Infrastructure Protection United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity (page images at HathiTrust) Communist Chinese cyber attacks, cyber espionage, and theft of American technology (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Oversight and Investigations (page images at HathiTrust) Cyber security : responding to the threat of cyber crime and terrorism : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, April 12, 2011 (U.S. G.P.O. :, 2011), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Crime and Terrorism (page images at HathiTrust) The Electronic Communications Privacy Act : government perspectives on protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, April 6, 2011 (U.S. G.P.O. :, 2011), by United States Senate Committee on the Judiciary (page images at HathiTrust) The Electronic Communications Privacy Act : promoting security and protecting privacy in the digital age : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, second session, September 22, 2010 (U.S. G.P.O. :, 2011), by United States Senate Committee on the Judiciary (page images at HathiTrust) Chinese hacking : impact on human rights and commercial rule of law : hearing before the Congressional-Executive Commission on China, One Hundred Thirteenth Congress, first session, June 25, 2013. (Washington : U.S. Government Printing Office, 2013., 2013), by United States Congressional-Executive Commission on China (page images at HathiTrust) The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013. ([publisher not identified], 2014), by United States Senate Committee on Commerce, Science, and Transportation and United States Senate Committee on Homeland Security and Governmental Affairs (page images at HathiTrust)
Filed under: Cyberspace -- Security measures -- United States -- Planning |