Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
The Resource
Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
- Label
- Computer security -- United States
241 Items that share the Concept Computer security -- United States
Context
Context of Computer security -- United StatesSubject of
No resources found
No enriched resources found
- 2020 Census : actions needed to address key risks to a successful enumeration
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- 2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
- 2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
- 7 prácticas para la seguridad de su computadora
- A data base management approach to Privacy Act compliance
- A global perspective on cyber threats : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, June 16, 2015
- A guide to the selection of anti-virus tools and techniques
- A lifeline: patient safety & cybersecurity : 2019 Public-Private Analytic Exchange Program : vulnerabilities of healthcare information technology systems
- A status update on the development of voluntary do-not-track standards : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, first session, April 24, 2013
- Additional controls can enhance the security of the automated commercial environment system
- Air Force and the cyberspace mission : defending the Air Force's computer networks in the future
- Alert
- Army science planning and strategy meeting : the fog of cyber war
- Assessing information security at the U.S. Department of Veterans Affairs : hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Eleventh Congress, second session, May 19, 2010
- Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
- Audit of the Criminal Division's entellitrak system pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Department of the Treasury's cybersecurity information sharing
- Audit of the Drug Enforcement Administration's Aviation Division Office Internet system pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Executive Office for United States Attorneys' information security program pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Federal Bureau of Investigation's Information Security Program pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Justice Management Division's Justice Security Tracking and Adjudication Record System pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Automated tools for testing computer system vulnerability
- Automation for distributed energy resources risk manager using OSCAL
- BEP's computer security incident response capability needs improvement
- Bolstering the government's cybersecurity : lessons learned from WannaCry : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, June 15, 2017
- Bolstering the government's security : assessing the risk of Kaspersky lab products to the federal government : hearing before the Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, October 25, 2017
- Breaking and entering : the extraordinary story of a hacker called "Alien"
- Breaking and entering : the extraordinary story of a hacker called "Alien"
- Breaking and entering : the extraordinary story of a hacker called "Alien"
- Breaking and entering : the extraordinary story of a hacker called "Alien"
- Byte wars : the impact of September 11 on information technology
- CBP has placed travelers' PII at risk of exploitation
- CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, 2018
- CDM, the future of federal cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, January 17, 2018
- COVID-19: selected agencies overcame technology challenges to support telework but need to fully assess security controls : report to congressional addressees
- Careful connections : keeping the internet of things secure
- Challenges in cybersecurity education and workforce development
- Chinese state-sponsored actors exploit publicly known vulnerabilities
- Committee markups of H.R. 1224, H.R. 1430, H.R. 1431, H.R. 2105, H.R. 2809, H.R. 2763, H.R. 1159, H.R. 4376, H.R. 4377, H.R. 4378, H.R. 4375, H.R. 4323, H.R. 4254, H.R. 3397, H.R. 4675, H.R. 5345, H.R. 5346, H.R. 5086, H.R. 5509, H.R. 5503, H.R. 5905, H.R. 5907, H.R. 5906, H.R. 6227, H.R. 6229, H.R. 6226, H.R. 6398, S. 141, and H.R. 6468 : compilation of markups before the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Fifteenth Congress, first and second session, 2017-2018
- Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
- Computer security impact of Y2K : expanded risks or fraud? Joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015
- Constitutional considerations of remote voting in Congress
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010
- Coordinating Oversight, Upgrading and Innovating Technology, and Examiner Reform Act of 2019 : report (to accompany H.R. 2514) (including cost estimate of the Congressional Budget Office)
- Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
- Critical infrastructure protection : sector-specific plans' coverage of key cyber security elements varies : report to Congressional requesters
- Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
- Cyber Sense Act of 2019 : report (to accompany H.R. 360)
- Cyber attacks : protecting national infrastructure
- Cyber operations today : preparing for 21st century challenges in an information-enabled society : Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, second session, hearing held April 11, 2018
- Cyber privacy : who has your data and why you should care
- Cyber security : a crisis of prioritization
- Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011
- Cyber security programs for nuclear facilities
- Cyber threats : law enforcement and private sector responses : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, first session, May 8, 2013
- Cyber threats and security solutions : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, first session, May 21, 2013
- Cyber threats facing America : an overview of the cybersecurity threat landscape : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, May 10, 2017
- Cybercrime : a sketch of 18 U.S.C. 1030 and related federal criminal laws (RS20830)
- Cybercrime : an overview of the Federal Computer Fraud and Abuse Statute and related federal criminal laws
- Cybercrime : hearing before a subcommittee of the Committee on Appropriations, United States Senate; One Hundred Sixth Congress, second session; special hearing
- Cybercrime against businesses
- Cybercrime against businesses, 2005
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
- Cybersecurity : assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
- Cybersecurity : emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009
- Cybersecurity : internet architecture is considered resilient, but federal agencies continue to address risks : report to the Committee on Armed Services, House of Representatives
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Cybersecurity : progress made but challenges remain in defining and coordinating the Comprehensive National Initiative : report to Congressional requesters
- Cybersecurity : threats to the financial sector : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, first session, September 14, 2011
- Cybersecurity : what the federal government can learn from the private sector : joint hearing before the Subcommittee on Research and Technology & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, January 8, 2016
- Cybersecurity and cyberwar : what everyone needs to know
- Cybersecurity and cyberwar : what everyone needs to know
- Cybersecurity assessment tools for distributed energy resources
- Cybersecurity for electric vehicle fast-charging infrastructure : preprint
- Cybersecurity for power systems : joint hearing before the Subcommittee on Energy & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, October 21, 2015
- Cybersecurity in photovoltaic plant operations
- Cybersecurity recommendations for the next administration : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
- Cybersecurity workforce: agencies need to improve baseline assessments and procedures for coding positions : report to congressional committees
- Cybersecurity, actions needed to strengthen U.S. capabilities : testimony before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives
- Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
- Cybersecurity, terrorism, and beyond : assessing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
- DHS Roles and Responsibilities in Cyber Space Act : report (to accompany H.R. 5658) (including cost estimate of the Congressional Budget Office)
- DHS cybersecurity : roles and responsibilities to protect the nation's critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- DHS has made limited progress implementing the Continuous Diagnostics and Mitigation Program
- DHS needs to improve cybersecurity workforce planning
- DHS' progress in disaster recovery planning for information systems
- DHS's effort to secure .gov : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, June 24, 2015
- Data breaches : what to know, what to do
- Database nation : the death of privacy in the 21st century
- Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Defense acquisitions : Cyber Command needs to develop metrics to assess warfighting capabilities : report to congressional committees
- Department of Homeland Security reauthorization and the President's fiscal year 2018 budget request : hearing before Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, June 7, 2017
- Dirty Tricks in the Digital Age
- Distributed detection of malicious attacks on consensus algorithms with applications in power networks : preprint
- ECPA : lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013, Part I
- Electronic Communications Privacy Act (ECPA) : geolocation privacy and surveillance : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013, Part II
- Emerging cyber threats to the United States : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, February 25, 2016
- Enhancing and implementing the cybersecurity elements of the sector-specific plans : joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Enhancing grid security through Public-Private Partnerships Act : report (to accompany H.R. 359)
- Ethical use of information technologies in education : important issues for America's schools
- Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information : (fiscal year 2006)
- Examining physical security and cybersecurity at our nation's ports : field hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, October 30, 2017
- Examining the evolving cyber insurance marketplace : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, March 19, 2015
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- External penetration test of FHFA's network and systems during 2018
- FEMA's longstanding IT deficiencies hindered 2017 response and recovery operations
- FHFA failed to ensure Freddie Mac's remedial plans for a cybersecurity MRA addressed all deficiencies; as allowed by its standard, FHFA closed the MRA after independently determining the enterprise completed its planned remedial actions
- FHFA's 2019 disaster recovery exercise of its general support system was conducted as planned, but its disaster recovery procedures were missing certain required elements and included outdated information
- Federal cybersecurity : America's data still at risk : staff report
- Federal information security : mixed progress in implementing program complements; improved metrics needed to measure effectiveness : report to Congressional committees
- Federal telework during the COVID-19 pandemic : cybersecurity issues in brief
- Filesharing programs and "technological features to induce users to share" : a report to the United States Patent and Trademark Office from the Office of International Relations, Prepared by Thomas D. Sydnor II, John Knight, Lee A. Hollaar
- Final recommendations of the National Security Commission on Artificial Intelligence : joint hearing before the Subcommittee on Cyber, Innovative Technologies, and Information Systems of the Committee on Armed Services, meeting jointly with the Subcommittee on National Security of the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, first session, hearing held March 12, 2021
- Foreign spies stealing US economic secrets in cyberspace : report to Congress on foreign economic collection and industrial espionage, 2009-2011
- Ghost in the wires : my adventures as the world's most wanted hacker
- Ghost in the wires : my adventures as the world's most wanted hacker
- Ghost in the wires : my adventures as the world's most wanted hacker
- Guide to NIST information security documents
- Guide to the Distributed Energy Resources Cybersecurity Framework
- Harvesting American Cybersecurity Knowledge through Education Act of 2019 : report of the Committee on Commerce, Science, and Transportation on S. 2775
- Hearing on National Defense Authorization Act for fiscal year 2022 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session : Subcommittee on Cyber, Innovative Technologies, and Information Systems on Department of Defense information technology, cybersecurity, and information assurance for fiscal year 2022, hearing held June 29, 2021
- Hearing on National Defense Authorization Act for fiscal year 2022 and oversight of previously authorized programs before the Committee on Armed Services, One Hundred Seventeenth Congress, first session : Subcommittee on Cyber, Innovative Technologies, and Information Systems on operations in cyberspace and building cyber capabilities across the Department of Defense, hearing held May 14, 2021
- Homeland cybersecurity : assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- Homeland cybersecurity : assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- How secure is veterans' privacy information? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, first session, Tuesday, June 4, 2013
- How to be invisible : protect your home, your children, your assets, and your life
- INL cyber security research : defending the network against hackers
- Impact and policy implications of spyware on consumers and businesses : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008
- Impact of blockchain delay on grid-tied solar inverter performance : preprint
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Improvements in patch and configuration management controls can better protect TSA's wireless network and devices : redacted
- Inadvertent file sharing over peer-to-peer networks : how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009
- Incidentes de seguridad de datos : qué saber, qué hacer
- Information resources management strategic plan : FY 2006-2008
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information technology : FMS's computer security incident response capability needs improvement
- Information technology : Fiscal Service needs to strengthen security controls over public-facing web servers
- Information technology : Mint's computer security incident response capability needs improvement
- Insider threat study : illicit cyber activity in the government sector
- Introduction to financial services : financial cybersecurity
- Investigating and prosecuting 21st century cyber threats : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Law firm cybersecurity
- Management guide to the protection of information resources
- Managing cyber supply chain risk for renewable energy technologies
- Maritime critical infrastructure protection : DHS needs to better address port cybersecurity : report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate
- ModuleOT : a hardware security module for operational technology : preprint
- National Change of Address Program : audit report
- National Cyber Awareness System
- National Institute of Standards and Technology Reauthorization Act of 2018 : report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- National information policy : report to the President of the United States
- Near-peer advancements in space and nuclear weapons : hearing before the Subcommittee on Strategic Forces of the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session, hearing held February 23, 2021
- Open hearing : National Security Agency activities and its ability to meet its diverse mission requirements : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fourtenth Congress, first session, Thursday, September 24, 2015
- Open hearing : hack of U.S. networks by a foreign adversary : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Seventeenth Congress, first session, Tuesday, February 23, 2021
- Open hearing on the intelligence community's assessment on Russian activities and intentions in the 2016 U.S. elections : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, first session, Tuesday, January 10, 2017
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- P2P file-sharing : evaluate the risks
- Personal information : data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown : report to congressional requesters
- Planning for the future of cyber attack attribution : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
- Power sector cybersecurity building blocks
- Power sector cybersecurity building blocks : getting started
- Preparing for the future : an assessment of emerging cyber threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, October 22, 2019
- Preparing for the future : an assessment of emerging cyber threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, October 22, 2019
- Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report
- Promoting and incentivizing cybersecurity best practices : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- Protect your workplace, guidance on physical and cyber security and reporting of suspicious behavior, activity, and cyber incidents
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting maritime facilities in the 21st century : are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting small businesses against emerging and complex cyber-attacks : hearing before the Subcommittee on Health and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 21, 2013
- Protecting the electric grid from cybersecurity threats : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, second session, September 11, 2008
- Protecting the public : Bureau of the Public Debt's control over computers needs to be improved
- Protecting the public : Financial Management Service's control over computers needs to be improved
- Protecting the public : Office of Thrift Supervision's control over computers is adequate
- Protecting the public : Office of the Comptroller of the Currency's control over computers needs to be improved
- Protecting the public : Treasury departmental offices' control over computers needs to be improved
- Recommended functionalities for improving cybersecurity of distributed energy resources : preprint
- Red Army Equifax hackers indicted
- Resiliency : the electric grid's only hope : hearing before the Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, October 3, 2017
- Review of CBP's major cybersecurity incident during a 2019 biometric pilot
- Review of the Department of Homeland Security's capability to share cyber threat information
- Risk management for distributed energy resources
- SBA Cyber Awareness Act : report (to accompany H.R. 3462)
- Sample statements of work for federal computer security services : for use in-house or contracting out
- Schneier on security
- Schneier on security
- Schneier on security
- Scholars or spies : foreign plots targeting America's research and development : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Securing the nation's internet architecture : joint hearing before the Subcommittee on Intelligence and Emerging Threats and Capabilities of the Committee on Armed Services meeting jointly with the Subcommittee on National Security of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, first session : hearing held September 10, 2019
- Security check : reducing risks to your computer systems
- Service-based, segmented, 5G network-based architecture for securing distributed energy resources : preprint
- Small business information security : the fundamentals (draft)
- Stop, think, click : 7 practices for safer computing
- Strengthening U.S. cybersecurity capabilities : hearing before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, February 14, 2017
- System and network security acronyms and abbreviations (draft)
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Technological convergence : regulatory, digital privacy, and data security issues
- Technology and information warfare : the competition for influence and the Department of Defense : hearing before the Subcommittee on Cyber, Innovative Technologies, and Information Systems of the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session, hearing held April 30, 2021
- Test results for hardware write block device : tableau T8 forensic USB bridge (USB interface)
- Test results for hardware write block device : tableau T8 forensic USB bridge (firewire interface)
- Test results for mobile device acquisition tool : Susteen DataPilot Secure View 1.8.0
- Text messages from your bank? : sounds "phishy"
- The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals
- The Department of Defense and the power of cloud computing : weighing acceptable cost versus acceptable risk
- The DoD cybersecurity policy chart
- The Food and Drug Administration's policies and procedures should better address postmarket cybersecurity risk to medical devices
- The U.S. SAFE WEB act : the first three years : a report to Congress
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The current state of private-sector engagement for cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 9, 2017
- The cyber talent pipeline : educating a workforce to match today's threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, One Hundred Seventeenth Congress, first session, July 29, 2021
- The dawn of the code war : America'sx battle against Russia, China, and the rising global cyber threat
- The encryption tightrope : balancing Americans' security and privacy : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, second session, March 1, 2016
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The need for privacy protections : perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012
- The road to 2020 : defending against election interference : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, November 19, 2019
- The road to 2020 : defending against election interference : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, November 19, 2019
- The role of cyber insurance in risk management : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, March 22, 2016
- The role of small businesses in strengthening cybersecurity efforts in the United States : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Twelfth Congress, first session, July 25, 2011
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The unwanted gaze : the destruction of privacy in America
- The unwanted gaze : the destruction of privacy in America
- The watchman : the twisted life and crimes of serial hacker Kevin Poulsen
- Threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, second session, September 24, 2020
- Threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, second session, September 24, 2020
- Timely actions needed to improve DOT's cybersecurity : Department of Transportation
- Top routinely exploited vulnerabilities
- Tribal Health Data Improvement Act of 2020 : report (to accompany H.R. 7948)
- USSS faces challenges protecting sensitive case management systems and data
- Under attack : federal cybersecurity and the OPM data breach : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fourteenth Congress, first session June 25, 2015
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2016
- Understanding the cybersecurity of America's aviation sector : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Transportation and Protective Security of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, September 6, 2018
- Virtual threat, real terror : cyberterrorism in the 21st century : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, second session, February 24, 2004
- Vulnerabilities highlight the need for more effective web security management
- Watching the watchers : a comparison of privacy bills in the 116th Congress
- Zhongguo die meng : fu bai que zai xing dong de guai shou
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>