Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Computer security -- United States
363 Items that share the Concept Computer security -- United States
Context
Context of Computer security -- United StatesSubject of
No resources found
No enriched resources found
- "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000
- "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000
- 2020 Census : actions needed to address key risks to a successful enumeration
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- 2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
- 21 steps to improve cyber security of SCADA networks
- 21st century SBA : an analysis of SBA's technology systems : hearing before the Subcommittee on Investigations, Oversight, and Regulations of the Committee on Small Business, United States House of Representatives, One Hundred Sixteenth Congress, second session, hearing held July 22, 2020
- 7 prácticas para la seguridad de su computadora
- A global perspective on cyber threats : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, June 16, 2015
- A guide to the selection of anti-virus tools and techniques
- A lifeline: patient safety & cybersecurity : 2019 Public-Private Analytic Exchange Program : vulnerabilities of healthcare information technology systems
- A status update on the development of voluntary do-not-track standards : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, first session, April 24, 2013
- Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
- Additional controls can enhance the security of the automated commercial environment system
- Air Force and the cyberspace mission : defending the Air Force's computer networks in the future
- Air traffic control : weak computer security practices jeopardize flight safety : report to the Committee on Governmental Affairs, U.S. Senate
- Alert
- Applying mobile agents to intrusion detection and response
- Army science planning and strategy meeting : the fog of cyber war
- Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005
- Assessing information security at the U.S. Department of Veterans Affairs : hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Eleventh Congress, second session, May 19, 2010
- At the nexus of cybersecurity and public policy : some basic concepts and issues
- Audit of the Criminal Division's Entellitrak system pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Department of the Treasury's cybersecurity information sharing
- Audit of the Drug Enforcement Administration's Aviation Division Office Internet system pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Executive Office for United States Attorneys' information security program pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Federal Bureau of Investigation's Information Security Program pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Justice Management Division's Justice Security Tracking and Adjudication Record System pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Automated tools for testing computer system vulnerability
- BEP's computer security incident response capability needs improvement
- Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex
- Bolstering the government's cybersecurity : assessing the risk of Kaspersky lab products to the federal government : hearing before the Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, October 25, 2017
- Bolstering the government's cybersecurity : lessons learned from WannaCry : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, June 15, 2017
- CBP has placed travelers' PII at risk of exploitation
- CMMC implementation : what it means for small businesses : hearing before the Subcommittee on Oversight, Investigations, and Regulations of the Committee on Small Business, House of Representatives, One Hundred Seventeenth Congress, first session, June 24, 2021
- COVID-19: selected agencies overcame technology challenges to support telework but need to fully assess security controls : report to congressional addressees
- CSPP : guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS)
- Careful connections : keeping the internet of things secure
- Carry On : Sound Advice from Schneier on Security
- Challenges in cybersecurity education and workforce development
- Chinese state-sponsored actors exploit publicly known vulnerabilities
- Commercial perspectives on information assurance research
- Committee markups of H.R. 1224, H.R. 1430, H.R. 1431, H.R. 2105, H.R. 2809, H.R. 2763, H.R. 1159, H.R. 4376, H.R. 4377, H.R. 4378, H.R. 4375, H.R. 4323, H.R. 4254, H.R. 3397, H.R. 4675, H.R. 5345, H.R. 5346, H.R. 5086, H.R. 5509, H.R. 5503, H.R. 5905, H.R. 5907, H.R. 5906, H.R. 6227, H.R. 6229, H.R. 6226, H.R. 6398, S. 141, and H.R. 6468 : compilation of markups before the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Fifteenth Congress, first and second sessions, 2017-2018
- Commodification of cyber capabilities : a grand cyber arms bazaar
- Computer Security Enhancement Act of 1997 : report (to accompany H.R. 1903) (including cost estimate of the Congressional Budget Office)
- Computer Security Enhancement Act of 1997 : report of the Committee on Commerce, Science, and Transportation on H.R. 1903
- Computer Security Enhancement Act of 2000 : report (to accompany H.R. 2413) (including cost estimate of the Congressional Budget Office)
- Computer and communications security and privacy : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, second session, September 24, 1984
- Computer and communications security and privacy : hearings before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, first session, September 26; October 17, 24, 1983
- Computer and communications security and privacy : report
- Computer insecurities at DOE headquarters : DOE's failure to get its own cyber house in order : hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, second session, June 13, 2000
- Computer security : critical federal operations and assets remain at risk : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives
- Computer security : cyber attacks - - war without borders hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congress, 2nd session, July 26, 2001
- Computer security : cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000
- Computer security : hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, first session, June 27, 1991
- Computer security : hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, first session, June 27, 1991
- Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
- Computer security impact of Y2K : expanded risks or fraud? : joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security impact of Y2K : expanded risks or fraud? Joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security in the Federal Government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, November 19, 2002
- Computer security in the federal government : hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science and Transportation, United States Senate, One Hundred Fifth Congress, second session, February 10, 1998
- Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Computer security lapses : should FAA be grounded? : hearing before the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, September 27, 2000
- Computer security policies : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, House of Representatives, Ninety-ninth Congress, first session, June 27, 1985
- Computer security report card : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 11, 2000
- Computer security report card : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 11, 2000
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015
- Constitutional considerations of remote voting in Congress
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010
- Coordinating Oversight, Upgrading and Innovating Technology, and Examiner Reform Act of 2019 : report (to accompany H.R. 2514) (including cost estimate of the Congressional Budget Office)
- Critical infrastructure protection : "ILOVEYOU" computer virus highlights need for improved alert and coordination capabilities : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Financial Institutions, Committee on Banking, Housing and Urban Affairs, U.S. Senate
- Critical infrastructure protection : comprehensive strategy can draw on year 2000 experiences : report to the chairman, Special Committee on the Year 2000 Technology Problem, U.S. Senate
- Critical infrastructure protection : efforts of the financial services sector to address cyber threats : report to the Subcommittee on Domestic Monetary Policy, Technology, and Economic Growth, Committee on Financial Services, House of Representatives
- Critical infrastructure protection : sector-specific plans' coverage of key cyber security elements varies : report to Congressional requesters
- Critical infrastructure protection : significant challenges in developing national capabilities : report to the Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, U.S. Senate
- Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
- Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing the roadblocks to investigation and information sharing, March 28, 2000
- Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing the roadblocks to investigation and information sharing, March 28, 2000
- Cyber attacks : the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000
- Cyber security : U.S. vulnerability and preparedness : hearing before the Committee on Science, House of Representatives, One Hundred Ninth Congress, first session, September 15, 2005
- Cyber security : a crisis of prioritization
- Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
- Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
- Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011
- Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011
- Cyber security : the challenges facing our nation in critical infrastructure protection : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, April 8, 2003
- Cyber security challenges at the Department of Energy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, June 9, 2006
- Cyber security programs for nuclear facilities
- Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003
- Cyber security--how can we protect American computer networks from attack? : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001
- Cyber terrorism--a view from the Gilmore Commission : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 17, 2001
- Cyber threats and security solutions : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, first session, May 21, 2013
- Cyber threats facing America : an overview of the cybersecurity threat landscape : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, May 10, 2017
- Cybercrime : a sketch of 18 U.S.C. 1030 and related federal criminal laws (RS20830)
- Cybercrime : an overview of the Federal Computer Fraud and Abuse Statute and related federal criminal laws
- Cybercrime : hearing before a subcommittee of the Committee on Appropriations, United States Senate, One Hundred Sixth Congress, second session, special hearing
- Cybercrime : hearing before a subcommittee of the Committee on Appropriations, United States Senate; One Hundred Sixth Congress, second session; special hearing
- Cybercrime against businesses
- Cybercrime against businesses, 2005
- Cybersecurity : actions needed to strengthen U.S. capabilities
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
- Cybersecurity : assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
- Cybersecurity : emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009
- Cybersecurity : getting it right : hearing of the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 22, 2003
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Cybersecurity : progress made but challenges remain in defining and coordinating the Comprehensive National Initiative : report to Congressional requesters
- Cybersecurity : protecting America's critical infrastructure, economy, and consumers : hearing before the Subcommittee on Telecommunications and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006
- Cybersecurity : threats to the financial sector : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, first session, September 14, 2011
- Cybersecurity : what the federal government can learn from the private sector : joint hearing before the Subcommittee on Research and Technology & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, January 8, 2016
- Cybersecurity at NASA : ongoing challenges and emerging issues for increased telework during COVID-19 : hearing before the Subcommittee on Space and Aeronautics of the Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, second session, September 18, 2020
- Cybersecurity for power systems : joint hearing before the Subcommittee on Energy & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, October 21, 2015
- Cybersecurity in photovoltaic plant operations
- Cybersecurity recommendations for the next administration : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
- Cybersecurity today and tomorrow : pay now or pay later
- Cybersecurity workforce: agencies need to improve baseline assessments and procedures for coding positions : report to congressional committees
- Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
- DHS cybersecurity : roles and responsibilities to protect the nation's critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- DHS has made limited progress implementing the Continuous Diagnostics and Mitigation Program
- DHS needs to improve cybersecurity workforce planning
- DHS' progress in disaster recovery planning for information systems
- DHS's effort to secure .gov : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, June 24, 2015
- Data protection and the consumer : who loses when your data takes a hike? : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, May 23, 2006
- Data security and bug bounty programs : lessons learned from the Uber breach and security researchers : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifteenth Congress, second session, February 6, 2018
- Database nation : the death of privacy in the 21st century
- Defending secrets, sharing data : new locks and keys for electronic information
- Department of Defense enterprise-wide cybersecurity policies and architecture : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, January 29, 2019
- Department of Homeland Security reauthorization and the President's fiscal year 2018 budget request : hearing before Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, June 7, 2017
- Department of Justice computer security : neglect leads to high risk : tenth report
- Digital rights management : technological, economic, legal and political aspects
- Distributed detection of malicious attacks on consensus algorithms with applications in power networks : preprint
- ECPA : lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013, Part I
- EPA's computer security self-assessment process needs improvement
- Electronic Communications Privacy Act (ECPA) : geolocation privacy and surveillance : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013, Part II
- Electronic government : planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives
- Employee privacy : computer-use monitoring practices and policies of selected companies
- Enhancing Grid Security through Public-Private Partnerships Act : report (to accompany H.R. 359)
- Enhancing and implementing the cybersecurity elements of the sector-specific plans : joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Enhancing and implementing the cybersecurity elements of the sector-specific plans : joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000
- Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000
- Enhancing data security : the regulators' perspective : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 18, 2005
- Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information : (fiscal year 2006)
- Examining physical security and cybersecurity at our nation's ports : field hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, October 30, 2017
- Examining the evolving cyber insurance marketplace : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, March 19, 2015
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Exploring the feasibility and security of technology to conduct remote voting in the House : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, second session, July 17, 2020
- External penetration test of FHFA's network and systems during 2018
- FEMA's longstanding IT deficiencies hindered 2017 response and recovery operations
- FHFA failed to ensure Freddie Mac's remedial plans for a cybersecurity MRA addressed all deficiencies; as allowed by its standard, FHFA closed the MRA after independently determining the enterprise completed its planned remedial actions
- FHFA's 2019 disaster recovery exercise of its general support system was conducted as planned, but its disaster recovery procedures were missing certain required elements and included outdated information
- FISMA and the risk management framework : the new practice of federal cyber security
- Failure of VA's information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006
- Federal cybersecurity : America's data still at risk : staff report
- Federal government computer security : hearings before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science and Technology, House of Representatives, Ninety-ninth Congress, first session, October 29, 30, 1985
- Federal information security : actions needed to address widespread weaknesses : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform, House of Representatives
- Federal information security : mixed progress in implementing program complements; improved metrics needed to measure effectiveness : report to Congressional committees
- Federal telework during the COVID-19 pandemic : cybersecurity issues in brief
- Fighting fraud : improving information security : joint hearing before the Subcommittee on Financial Institutions and Consumer Credit and the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Eighth Congress, first session, April 3, 2003
- Filesharing programs and "technological features to induce users to share" : a report to the United States Patent and Trademark Office from the Office of International Relations, Prepared by Thomas D. Sydnor II, John Knight, Lee A. Hollaar
- Foreign affairs : effort to upgrade information technology overseas faces formidable challenges : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on International Relations, House of Representatives
- Foreign spies stealing US economic secrets in cyberspace : report to Congress on foreign economic collection and industrial espionage, 2009-2011
- Fourth Amendment and the Internet : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000
- Fourth Amendment and the Internet : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000
- Fourth Amendment issues raised by the FBI's "Carnivore" program : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, July 24, 2000
- Government Information Security Act of 1999 : report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1993, to reform government information security by strengthening information security practices throughout the federal government
- Guide for developing security plans for information technology systems
- Guide to NIST information security documents
- Guide to the Distributed Energy Resources Cybersecurity Framework
- Guideline for implementing cryptography in the federal government
- Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products : recommendations of the National Institute of Standards and Technology
- H.R. 2413, the Computer Security Enhancement Act of 1999 : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, first session, September 30, 1999
- Harvesting American Cybersecurity Knowledge through Education Act of 2019 : report of the Committee on Commerce, Science, and Transportation on S. 2775
- Hearing II on information technology : hearing before the Subcommittee Oversight and Investigations of the Committee on Veterans' Affairs, House of Representatives, One Hundred Sixth Congress, second session, September 21, 2000
- Hearing III on information technology : hearing before the Subcommittee Oversight and Investigations of the Committee on Veterans' Affairs, House of Representatives, One Hundred Seventh Congress, first session, April 4, 2001
- Hearing on National Defense Authorization Act for fiscal year 2022 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session : Subcommittee on Cyber, Innovative Technologies, and Information Systems on Department of Defense information technology, cybersecurity, and information assurance for fiscal year 2022, hearing held June 29, 2021
- Hearing on the repeated failures of VA's information technology management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 14, 2006
- Homeland cybersecurity : assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- Homeland security : the federal and New York response : field hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- How secure is sensitive Commerce Department data and operations? : a review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001
- How to comply with the children's online privacy protection rule
- INL cyber security research : defending the network against hackers
- Identity theft : innovative solutions for an evolving problem : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, first session, March 21, 2007
- Identity theft : recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005
- Identity theft : the causes, costs, consequences, and potential solutions : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 22, 2004
- Impact and policy implications of spyware on consumers and businesses : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008
- Implementation of the USA Patriot Act : crime, terrorism and the age of technology : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, first session, April 21, 2005
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Improvements in patch and configuration management controls can better protect TSA's wireless network and devices : redacted
- Inadvertent file sharing over peer-to-peer networks : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007
- Inadvertent file sharing over peer-to-peer networks : how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009
- Industry speaks on cybersecurity : hearing of [sic] the Subcommittee on Cybersecurity, Science, and Research and Development before [sic] the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 15, 2003
- Industry speaks on cybersecurity : hearing of the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 15, 2003
- Information resources management strategic plan : FY 2006-2008
- Information security : "ILOVEYOU" Computer virus emphasizes critical need for agency and governmentwide improvements : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives
- Information security : Code Red, Code Red II, and SirCam attacks highlight need for proactive measures
- Information security : Subcommittee post-hearing questions concerning the additional actions needed to implement reform legislation
- Information security : additional actions needed to fully implement reform legislation
- Information security : challenges to improving DOD's incident response capabilities
- Information security : continued efforts needed to fully implement statutory requirements : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform
- Information security : further efforts needed to fully implement statutory requirements in DOD : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Terrorism, Unconventional Threats and Capabilities, Committee on Armed Services, House of Representatives
- Information security : progress made, but challenges remain to protect federal systems and the nation's critical infrastructures
- Information security : progress made, but weaknesses at the Internal Revenue Service continue to pose risks
- Information security : progress reported, but weaknesses at federal agencies persist : testimony before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information security : serious and widespread weaknesses persist at federal agencies : report to the Chairman, Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives
- Information security : serious weaknesses place critical federal operations and assets at risk : report to the Committee on Governmental Affairs, U.S. Senate
- Information security : serious weaknesses put State Department and FAA operations at risk : statement for the record by Gene L. Dodaro, Assistant Comptroller General, Accounting and Information Management Division, for the Committee on Governmental Affairs, U.S. Senate
- Information security : software change controls at the Department of Agriculture
- Information security : software change controls at the Department of Commerce
- Information security : software change controls at the Department of Defense
- Information security : software change controls at the Department of Energy
- Information security : software change controls at the Department of Health and Human Services
- Information security : software change controls at the Department of Housing and Urban Development
- Information security : software change controls at the Department of Interior
- Information security : software change controls at the Department of Justice
- Information security : software change controls at the Department of Labor
- Information security : software change controls at the Department of State
- Information security : software change controls at the Department of Transportation
- Information security : software change controls at the Department of Veterans Affairs
- Information security : software change controls at the Department of the Treasury
- Information security : software change controls at the Office of Personnel Management
- Information security : software change controls at the Social Security Administration
- Information security : weaknesses place commerce data and operations at serious risk : report to the chairman, Committee on Energy and Commerce, House of Representatives
- Information security : weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information systems : the status of computer security at the Department of Veterans Affairs : report to the Secretary of Veterans Affairs
- Information technology : FMS's computer security incident response capability needs improvement
- Information technology : Fiscal Service needs to strengthen security controls over public-facing web servers
- Information technology ; : Mint's computer security incident response capability needs improvement
- Information technology for counterterrorism : immediate actions and future possibilities
- Information technology security training requirements : a role- and performance-based model
- Insider threat study : illicit cyber activity in the government sector
- Internet security : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000
- Introduction to financial services : financial cybersecurity
- Issue update on information security and privacy in network environments
- Joint hearing to receive testimony on the cyber operational readiness of the Department of Defense (open session : hearing before the Subcommittee on Cybersecurity and the Subcommittee on Personnel of the Committee on Armed Services, United States Senate, One Hundred Fifteenth Congress, second session, September 26, 2018
- Lessons learned from the Government Information Security Reform Act of 2000 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002
- Lessons learned from the Government Information Security Reform Act of 2000 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002
- Locking your cyber front door : the challenges facing home users and small businesses : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 16, 2004
- Making federal computers secure : overseeing effective information security management : third report
- Management guide to the protection of information resources
- Maritime critical infrastructure protection : DHS needs to better address port cybersecurity : report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate
- Markup of : h.r. 4256, "Investing in Main Street Act of 2021," h.r. 4481, "Small Business 7(a) Loan Agent Transparency Act," h.r. 4531, "7(a) Loan Agent Oversight Act," h.r. 3469, "Veteran Entrepreneurship Training Act of 2021," h.r. 3462, "SBA Cyber Awareness Act," h.r. 4515, "Small Business Development Center Cyber Training Act of 2021," h.r. 4513, "Small Business Advanced Cybersecurity Enhancements Act of 2021" : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Seventeenth Congress, first session, hearing held July 29, 2021
- Meeting the need for inter-operability and information security in health IT : hearing before the Committee on Science and Technology, House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007
- Millennium Digital Commerce Act : report of the Committee on Commerce, Science, and Transportation on S. 761
- Millennium Digital Commerce Act, S. 761 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999
- Millennium Digital Commerce Act, S. 761 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999
- Minimum interoperability specification for PKI components (MISPC
- ModuleOT : a hardware security module for operational technology : preprint
- More hires, fewer hacks : developing the U.S. cybersecurity workforce : hearing before the Subcommittee on Research and Technology of the Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, second session, Tuesday, February 11, 2020
- National Change of Address Program : audit report
- National Cyber Awareness System
- National Institute of Standards and Technology Reauthorization Act of 2018 : report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- Open hearing on the intelligence community's assessment on Russian activities and intentions in the 2016 U.S. elections : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, first session, Tuesday, January 10, 2017
- Overexposed : the threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003
- Oversight hearing on Veterans Benefits Administration data security : joint hearing before the Committee on Veterans' Affairs, House of Representatives, Subcommittee on Economic Opportunity and the Subcommittee on Disability Assistance and Memorial Affairs, One Hundred Ninth Congress, second session, June 20, 2006
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- Oversight of the State Department : technology modernization and computer security : hearing before the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, second session, June 22, 2000
- Overview of the cyber problem : a nation dependent and dealing with risk : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, June 22, 2003
- P2P file-sharing : evaluate the risks
- Personal information : data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown : report to congressional requesters
- Planning for the future of cyber attack attribution : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
- Power sector cybersecurity building blocks
- Preparing for the future : an assessment of emerging cyber threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, October 22, 2019
- Privacy in America : is your private life in the public eye?
- Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report
- Protect your workplace, guidance on physical and cyber security and reporting of suspicious behavior, activity, and cyber incidents
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting our nation's cyber space : educational awareness for the cyber citizen : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting the electric grid from cybersecurity threats : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, second session, September 11, 2008
- Protecting the public : Bureau of the Public Debt's control over computers needs to be improved
- Protecting the public : Financial Management Service's control over computers needs to be improved
- Protecting the public : Office of Thrift Supervision's control over computers is adequate
- Protecting the public : Office of the Comptroller of the Currency's control over computers needs to be improved
- Protecting the public : Treasury departmental offices' control over computers needs to be improved
- Public switched network security assessment guidelines
- Recommended functionalities for improving cybersecurity of distributed energy resources : preprint
- Red Army Equifax hackers indicted
- Resiliency : the electric grid's only hope : hearing before the Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, October 3, 2017
- Review of CBP's major cybersecurity incident during a 2019 biometric pilot
- Review of the Department of Homeland Security's capability to share cyber threat information : redacted
- SBA Cyber Awareness Act : report (to accompany H.R. 3462)
- SCADA systems and the terrorist threat : protecting the nation's critical control systems : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity with the Subcommittee on Emergency Preparedness, Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, October 18, 2005
- Sample statements of work for federal computer security services : for use in-house or contracting out
- Schneier on security
- Scholars or spies : foreign plots targeting America's research and development : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Securing consumers' data : options following security breaches : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, May 11, 2005
- Securing electronic personal data : striking a balance between privacy and commercial and governmental use : hearing before the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, first session, April 13, 2005
- Securing the nation's internet architecture : joint hearing before the Subcommittee on Intelligence and Emerging Threats and Capabilities of the Committee on Armed Services meeting jointly with the Subcommittee on National Security of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, first session : hearing held September 10, 2019
- Security check : reducing risks to your computer systems
- Security in the information age : new challenges, new strategies : compendium of papers submitted to the Joint Economic Committee, Congress of the United States
- Security issues in the database language SQL
- Service-based, segmented, 5G network-based architecture for securing distributed energy resources : preprint
- Small business information security : the fundamentals (draft)
- Software update required : COVID-19 exposes need for federal investments in technology : hearing before the Committee on the Budget, House of Representatives, One Hundred Sixteenth Congress, second session, hearing held in Washington, D.C., July 15, 2020
- Staff report on feasibility of remote voting in the United States House of Representatives : pursuant to House Resolution 965, \U+00a7\5 : November 10, 2020 : 116th Congress, second session
- Status of the 1990 decennial census
- Stop, think, click : 7 practices for safer computing
- Strengthening U.S. cybersecurity capabilities : hearing before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, February 14, 2017
- Strengthening the cybersecurity posture of America's small business community : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Seventeenth Congress, first session, hearing held July 20, 2021
- System and network security acronyms and abbreviations (draft)
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Technological convergence : regulatory, digital privacy, and data security issues
- Technology and information warfare : the competition for influence and the Department of Defense : hearing before the Subcommittee on Cyber, Innovative Technologies, and Information Systems of the Committee on Armed Services, House of Representatives, One Hundred Seventeenth Congress, first session, hearing held April 30, 2021
- Technology assessment : cybersecurity for critical infrastructure protection
- Technology development at the Federal Aviation Administration : computer and information technology challenges of the 21st century : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, second session, August 6, 1998
- Telecommunications and SCADA : secure links or open portals to the security of our nation's critical infrastructure? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 30, 2004
- Test results for hardware write block device : tableau T8 forensic USB bridge (USB interface)
- Test results for hardware write block device : tableau T8 forensic USB bridge (firewire interface)
- Test results for mobile device acquisition tool : Susteen DataPilot Secure View 1.8.0
- Test results for software write block tools, RCMP HDL VO.8
- Text messages from your bank? : sounds "phishy"
- The "ILOVEYOU" virus and its impact on the U.S. financial services industry : hearing before the Subcommittee on Financial Institutions of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixth Congress, second session ... May 18, 2000
- The 2021 GAO high-risk list : blueprint for a safer, stronger, more effective America : hearing before the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, first session, March 2, 2021
- The Computer Security Act of 1987 : hearing before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundreth Congress, first session, February 26, 1987
- The Computer Security Act of 1987 : hearing before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One hundredth Congress, first session, February 26, 1987
- The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997
- The Department of Defense and the power of cloud computing : weighing acceptable cost versus acceptable risk
- The DoD cybersecurity policy chart
- The Food and Drug Administration's policies and procedures should better address postmarket cybersecurity risk to medical devices
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999
- The U.S. SAFE WEB act : the first three years : a report to Congress
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The current state of private-sector engagement for cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 9, 2017
- The cybersecurity responsibilities of the defense industrial base : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, March 26, 2019
- The dark side of a bright idea : could personal and national security risks compromise the potential of peer-to-peer file-sharing networks? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, first session, June 17, 2003
- The encryption tightrope : balancing Americans' security and privacy : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, second session, March 1, 2016
- The evolution of energy infrastructure in the United States and how lessons learned from the past can inform future opportunities : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Fifteenth Congress, second session, February 8, 2018
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The future of electricity delivery : modernizing and securing our nation's electricity grid : hearing before the Subcommittee on Energy, Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, first session, July 17, 2019
- The future of electricity delivery : modernizing and securing our nation's electricity grid : hearing before the Subcommittee on Energy, Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, first session, July 17, 2019
- The invisible battleground : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 16, 2003
- The road to 2020 : defending against election interference : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, November 19, 2019
- The role of computer security in protecting U.S. infrastructures : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, November 6, 1997
- The role of small businesses in strengthening cybersecurity efforts in the United States : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Twelfth Congress, first session, July 25, 2011
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The state of small business security in a cyber economy : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006
- The status and outlook for cybersecurity efforts in the energy industry : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixteenth Congress, first session, February 14, 2019
- Threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, second session, September 24, 2020
- Timely actions needed to improve DOT's cybersecurity : Department of Transportation
- Top routinely exploited vulnerabilities
- Tribal Health Data Improvement Act of 2020 : report (to accompany H.R. 7948)
- USSS faces challenges protecting sensitive case management systems and data
- Under attack : federal cybersecurity and the OPM data breach : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fourteenth Congress, first session June 25, 2015
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2015
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2015
- Update on the breach of data security at the Department of Veterans Affairs : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 29, 2006
- VA information technology : important initiatives begun, yet serious vulnerabilities persist : statement of David L. McClure, Director, Information Technology Management Issues, before the Subcommittee on Oversight and Investigations, Committee on Veterans' Affairs, House of Representatives
- Virtual threat, real terror : cyberterrorism in the 21st century : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, second session, February 24, 2004
- Vulnerabilities highlight the need for more effective web security management
- Watching the watchers : a comparison of privacy bills in the 116th Congress
- Which VA IT organizational structure would have best prevented VA's "meltdown" in information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 28, 2006
- Who goes there? : authentication through the lens of privacy
- Who might be lurking at your cyber front door? Is your system really secure? : strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004
- Worm and virus defense : how can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003
- You've got mail, but is it secure? : an examination of Internet vulnerabilities affecting businesses, governments and homes : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 16, 2003
- Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>