Computer security -- United States
Label
Computer security -- United States
Name
Computer security
Focus
Sub focus
Actions
Incoming Resources
- Security check, reducing risks to your computer systems
- Text messages from your bank?, sounds "phishy"
- Electronic government, planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives, United States General Accounting Office
- Cyber attacks, the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000
- Protecting the electric grid from cybersecurity threats, hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, second session, September 11, 2008
- Protecting the public, Office of Thrift Supervision's control over computers is adequate
- Review of the Department of Homeland Security's capability to share cyber threat information, redacted, Department of Homeland Security, Office of Inspector General
- Internet security, hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000
- Protecting small businesses against emerging and complex cyber-attacks, hearing before the Subcommittee on Health and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 21, 2013
- The fifth domain, defending our country, our companies, and ourselves in the age of cyber threats, Richard A. Clarke and Robert K. Knake
- The U.S. SAFE WEB act, the first three years : a report to Congress
- Public switched network security assessment guidelines, prepared by the Office of the Manager, National Communications System
- Ghost in the wires, Kevin Mitnick with William L. Simon
- Critical infrastructure protection, efforts of the financial services sector to address cyber threats : report to the Subcommittee on Domestic Monetary Policy, Technology, and Economic Growth, Committee on Financial Services, House of Representatives
- Information security, weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives, United States General Accounting Office
- Impact and policy implications of spyware on consumers and businesses, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008
- Inadvertent file sharing over peer-to-peer networks, how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009
- Cyber attacks, removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing the roadblocks to investigation and information sharing, March 28, 2000
- Prying eyes, protect your privacy from people who sell to you, snoop on you, and steal from you, Eric J. Gertler
- How secure is veterans' privacy information?, hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, first session, Tuesday, June 4, 2013
- Test results for software write block tools, RCMP HDL VO.8
- Enhancing and implementing the cybersecurity elements of the sector-specific plans, joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- The state of online consumer privacy, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- INL cyber security research, defending the network against hackers
- Millennium Digital Commerce Act, S. 761, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999
- Breaking and entering, the extraordinary story of a hacker called "Alien", Jeremy N. Smith
- Millennium Digital Commerce Act, report of the Committee on Commerce, Science, and Transportation on S. 761
- Improvements in patch and configuration management controls can better protect TSA's wireless network and devices, redacted, Department of Homeland Security, Office of Inspector General
- Sample statements of work for federal computer security services, for use in-house or contracting out, Dennis M. Gilbert, project leader ; Nickilyn Lynch, editor
- Cyber security, the challenges facing our nation in critical infrastructure protection : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, April 8, 2003
- Foreign spies stealing US economic secrets in cyberspace, report to Congress on foreign economic collection and industrial espionage, 2009-2011, Office of the National Counterintelligence Executive
- Cybercrime against businesses, by Ramona R. Rantala
- The Chinese information war, espionage, cyberwar, communications control and related threats to United States interests, Dennis F. Poindexter
- Protect your workplace, guidance on physical and cyber security and reporting of suspicious behavior, activity, and cyber incidents
- Cybercrime against businesses, 2005, by Ramona R. Rantala
- The need for privacy protections, perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012
- A status update on the development of voluntary do-not-track standards, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, first session, April 24, 2013
- Investigating and prosecuting 21st century cyber threats, hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Cybersecurity and cyberwar
- Assessing information security at the U.S. Department of Veterans Affairs, hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Eleventh Congress, second session, May 19, 2010
- Protecting the public, Bureau of the Public Debt's control over computers needs to be improved
- Cyber privacy, who has your data and why you should care, April Falcon Doss
- ECPA, lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013, Part I
- Information security, additional actions needed to fully implement reform legislation, United States General Accounting Office
- Timely actions needed to improve DOT's cybersecurity, Department of Transportation, prepared by the Office of Inspector General, U.S. Department of Transportation
- Test results for mobile device acquisition tool, Susteen DataPilot Secure View 1.8.0
- Cybersecurity and cyberwar, what everyone needs to know, P.W. Singer and Allan Friedman
- Guide to NIST information security documents
- Privacy for sale, how computerization has made everyone's private life an open secret, Jeffrey Rothfeder
- Information security, continued efforts needed to fully implement statutory requirements : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, United States General Accounting Office
Outgoing Resources
- Focus1
- Sub focus1