Electronic data processing -- United States -- Security measuresSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Electronic data processing -- United States -- Security measures
Items below (if any) are from related and broader terms.
Filed under: Data protection -- United States Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) What the Government Does With Americans' Data (New York: Brennan Center for Justice, c2013), by Rachel Levinson-Waldman (PDF with commentary at brennancenter.org) Investigation of Competition in Digital Markets: Majority Staff Report and Recommendations (2020), by United States House Committee on the Judiciary (PDF at fdlp.gov) A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
Filed under: Computer security -- United States Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
Filed under: Data encryption (Computer science) -- United States Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
Filed under: Data encryption (Computer science) -- Law and legislation -- United StatesFiled under: Computer security -- Government policy -- United StatesFiled under: Data protection -- Law and legislation -- United States Patient's Guide to HIPAA: How to Use the Law to Guard Your Health Privacy (version 2.0; Lake Oswego, OR: World Privacy Forum, c2019), by Robert Gellman, contrib. by Pam Dixon (HTML with commentary at worldprivacyforum.org) Liberty and Security in a Changing World: Report and Recommendations of the President's Review Group on Intelligence and Communications Technologies (2013), by United States President's Review Group on Intelligence and Communications Technologies, contrib. by Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter P. Swire (PDF with commentary at whitehouse.gov)
Filed under: Aeronautics, Commercial -- Security measures Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust) Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Air bases, American -- Security measures Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Filed under: Airports -- Security measures Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust) Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust) Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Command and control systems -- United States -- Security measures
Filed under: Computer networks -- Security measures Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide) The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP) Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com) Filed under: Cyberinfrastructure -- Security measures Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell Filed under: Dwellings -- Security measuresFiled under: Electronic data processing departments -- Security measures Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov) Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil) Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org) Filed under: Information services -- United States -- Security measuresFiled under: Information storage and retrieval systems -- Security measuresFiled under: Information technology -- Security measuresFiled under: Internet -- Security measuresFiled under: Internet of things -- Security measuresFiled under: Nuclear industry -- Security measures Nuclear Proliferation and Safeguards (2 volumes; 1977), by United States Congress Office of Technology Assessment Filed under: Olympic Games (26th : 1996 : Atlanta, Ga.) -- Security measuresMore items available under broader and related terms at left. |