Title: | Budget request for information technology and cyber operations programs |
Alternate title: | Hearing on National Defense Authorization Act for Fiscal Year 2013 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session : Subcommittee on Emerging Threats and Capabilities hearing on budget request for information technology and cyber operations programs, hearing held March 20, 2012. |
Author: | United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities |
Note: | U.S. G.P.O. :, 2012 |
Link: | page images at HathiTrust |
No stable link: | This is an uncurated book entry from our extended bookshelves, readable online now but without a stable link here. You should not bookmark this page, but you can request that we add this book to our curated collection, which has stable links. |
Subject: | Computer crimes -- United States -- Prevention |
Subject: | Computer networks -- Security measures -- United States |
Subject: | Computer security -- Government policy -- United States |
Subject: | Cyberspace -- Government policy -- United States |
Subject: | Cyberspace -- Security measures -- United States |
Subject: | Cyberterrorism -- United States -- Prevention |
Subject: | United States -- Armed Forces -- Appropriations and expenditures |
Subject: | United States. Department of Defense -- Appropriations and expenditures |
Subject: | United States. Department of Defense -- Information technology |
Subject: | United States. Strategic Command (2002- ). Cyber Command |
Other copies: | Look for editions of this book at your library, or elsewhere. |
Help with reading books -- Report a bad link -- Suggest a new listing
Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials
Books -- News -- Features -- Archives -- The Inside Story
Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.