Computer security -- United States -- Management
Resource Information
The concept Computer security -- United States -- Management represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security -- United States -- Management
Resource Information
The concept Computer security -- United States -- Management represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security -- United States -- Management
14 Items that share the Concept Computer security -- United States -- Management
Context
Context of Computer security -- United States -- ManagementSubject of
No resources found
No enriched resources found
- Information security risk assessment : practices of leading organizations : a supplement to GAO's May 1998 executive guide on information security management
- Critical information infrastructure protection : the threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999
- Critical infrastructure protection : fundamental improvements needed to assure security of federal operations : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, U.S. Senate
- Federal agencies under attack : why are government websites vulnerable? : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, first session, June 24, 1999
- Federal chief information officer : leadership needed to confront serious challenges and emerging issues : statement of David L. McClure, Associate Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives
- Financial Management Service : areas for improvement in computer controls : report to the Secretary of the Treasury
- Financial Management Service : significant weaknesses in computer controls : report to the secretary of the Treasury
- Financial Management Service : significant weaknesses in computer controls continue : report to the Secretary of the Treasury
- Information security : agencies need to implement consistent processes in authorizing systems for operation : report to congressional requesters
- Information security : answers to posthearing questions
- Information security : recent attacks on federal web sites underscore need for stronger information security management : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives
- Information security : technologies to secure federal systems : report to Congressional Requesters
- Information security : the proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives
- Information security : weak controls place Interior's financial and other data at risk : report to the secretary of the Interior
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/CV1_zolDc8Y/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/CV1_zolDc8Y/">Computer security -- United States -- Management</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- United States -- Management
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/CV1_zolDc8Y/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/CV1_zolDc8Y/">Computer security -- United States -- Management</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>