Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security -- United States
315 Items that share the Concept Computer security -- United States
Context
Context of Computer security -- United StatesSubject of
No resources found
No enriched resources found
- 2010 Census : Basic Design Has Potential, but Remaining Challenges Need Prompt Resolution
- 2020 Census : actions needed to address key risks to a successful enumeration
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- 7 prácticas para la seguridad de su computadora
- A global perspective on cyber threats : hearing before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, June 16, 2015
- A lesson of the Gulf War : national security requires computer security : hearing before the Subcommittee on Government Information and Regulation of the Committee on Governmental Affairs, United States Senate, One Hundred Second Congress, first session, June 19, 1991
- A status update on the development of voluntary do-not-track standards : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, first session, April 24, 2013
- Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
- Additional controls can enhance the security of the automated commercial environment system
- Alert
- Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005
- Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
- Audit of the Criminal Division's Entellitrak system pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Drug Enforcement Administration's Aviation Division Office Internet system pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Executive Office for United States Attorneys' information security program pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Audit of the Federal Bureau of Investigation's Information Security Program pursuant to the Federal Information Security Modernization Act of 2014, fiscal year 2018
- Audit of the Justice Management Division's Justice Security Tracking and Adjudication Record System pursuant to the Federal Information Security Modernization Act of 2014, Fiscal Year 2018
- Bolstering the government's cybersecurity : assessing the risk of Kaspersky lab products to the federal government : hearing before the Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, October 25, 2017
- Bolstering the government's cybersecurity : lessons learned from WannaCry : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, June 15, 2017
- Bureau of Public Debt : Areas for Improvement in Information Security Controls
- Bureau of the Public Debt : Areas for Improvement in Information Security Controls
- Business Systems Modernization : IRS Needs To Complete Recent Efforts To Develop Policies and Procedures To Guide Requirements Development and Management
- CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, 2018
- CDM, the future of federal cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, January 17, 2018
- Committee markups of H.R. 1224, H.R. 1430, H.R. 1431, H.R. 2105, H.R. 2809, H.R. 2763, H.R. 1159, H.R. 4376, H.R. 4377, H.R. 4378, H.R. 4375, H.R. 4323, H.R. 4254, H.R. 3397, H.R. 4675, H.R. 5345, H.R. 5346, H.R. 5086, H.R. 5509, H.R. 5503, H.R. 5905, H.R. 5907, H.R. 5906, H.R. 6227, H.R. 6229, H.R. 6226, H.R. 6398, S. 141, and H.R. 6468 : compilation of markups before the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Fifteenth Congress, first and second sessions, 2017-2018
- Computer Matching and Privacy Protection Act of 1988 : P.L. 100-503, 102 Stat. 2507, October 18, 1988
- Computer Security Act of 1987 : P.L. 100-235, 101 Stat. 1724, January 8, 1988
- Computer Security Enhancement Act of 1997 : report (to accompany H.R. 1903) (including cost estimate of the Congressional Budget Office)
- Computer Security Enhancement Act of 2000 : report (to accompany H.R. 2413) (including cost estimate of the Congressional Budget Office)
- Computer insecurities at DOE headquarters : DOE's failure to get its own cyber house in order : hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, second session, June 13, 2000
- Computer security : FAA is addressing personnel weaknesses, but further action is required : report to the chairman and ranking minority member, Committee on Science, House of Representatives
- Computer security : are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000
- Computer security : cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000
- Computer security : cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000
- Computer security : reported appropriations and obligations for four major initiatives
- Computer security at the Drug Enforcement Administration : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, second session, September 30, 1992
- Computer security impact of Y2K : expanded risks or fraud? : joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security impact of Y2K : expanded risks or fraud? Joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security in the Federal Government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, November 19, 2002
- Computer security in the federal government : hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science and Transportation, United States Senate, One Hundred Fifth Congress, second session, February 10, 1998
- Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001
- Computer security lapses : should FAA be grounded? : hearing before the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, September 27, 2000
- Computer security lapses : should FAA be grounded? : hearing before the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, September 27, 2000
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010
- Coordinating Oversight, Upgrading and Innovating Technology, and Examiner Reform Act of 2019 : report (to accompany H.R. 2514) (including cost estimate of the Congressional Budget Office)
- Critical Infrastructure Protection : Multiple Efforts To Secure Control Systems Are Under Way, but Challenges Remain
- Critical Infrastructure Protection : Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
- Critical infrastructure protection : "ILOVEYOU" computer virus highlights need for improved alert and coordination capabilities : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Financial Institutions, Committee on Banking, Housing and Urban Affairs, U.S. Senate
- Critical infrastructure protection : comprehensive strategy can draw on Year 2000 experiences : report to the chairman, Special Committee on the Year 2000 Technology Problem, U.S. Senate
- Critical infrastructure protection : efforts of the financial services sector to address cyber threats : report to the Subcommittee on Domestic Monetary Policy, Technology, and Economic Growth, Committee on Financial Services, House of Representatives
- Critical infrastructure protection : sector-specific plans' coverage of key cyber security elements varies : report to Congressional requesters
- Cyber Analysis and Warning : DHS Faces Challenges in Establishing a Comprehensive National Capability
- Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
- Cyber Sense Act of 2019 : report (to accompany H.R. 360)
- Cyber attack : is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998
- Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000
- Cyber attacks : the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000
- Cyber security : U.S. vulnerability and preparedness : hearing before the Committee on Science, House of Representatives, One Hundred Ninth Congress, first session, September 15, 2005
- Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
- Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001
- Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011
- Cyber security : the challenges facing our nation in critical infrastructure protection : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, April 8, 2003
- Cyber security challenges at the Department of Energy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, June 9, 2006
- Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003
- Cyber security--how can we protect American computer networks from attack? : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001
- Cyber terrorism and information warfare
- Cyber terrorism--a view from the Gilmore Commission : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 17, 2001
- Cyber threats : law enforcement and private sector responses : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, first session, May 8, 2013
- Cyber threats and security solutions : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, first session, May 21, 2013
- Cybercrime : Public and Private Entities Face Challenges in Addressing Cyber Threats
- Cybercrime : hearing before a subcommittee of the Committee on Appropriations, United States Senate, One Hundred Sixth Congress, second session, special hearing
- Cybercrime against businesses
- Cybercrime against businesses, 2005
- Cybersecurity & the courthouse : safeguarding the judicial process
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009
- Cybersecurity : assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
- Cybersecurity : emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009
- Cybersecurity : getting it right : hearing of the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 22, 2003
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Cybersecurity : progress made but challenges remain in defining and coordinating the Comprehensive National Initiative : report to Congressional requesters
- Cybersecurity : protecting America's critical infrastructure, economy, and consumers : hearing before the Subcommittee on Telecommunications and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006
- Cybersecurity : protecting America's critical infrastructure, economy, and consumers : hearing before the Subcommittee on Telecommunications and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006
- Cybersecurity : threats to the financial sector : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, first session, September 14, 2011
- Cybersecurity : what the federal government can learn from the private sector : joint hearing before the Subcommittee on Research and Technology & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, January 8, 2016
- Cybersecurity for power systems : joint hearing before the Subcommittee on Energy & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, October 21, 2015
- Cybersecurity recommendations for the next administration : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
- Cybersecurity, actions needed to strengthen U.S. capabilities : testimony before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives
- DHS cybersecurity : roles and responsibilities to protect the nation's critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- DHS needs to improve cybersecurity workforce planning
- DHS' progress in disaster recovery planning for information systems
- DHS's effort to secure .gov : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, June 24, 2015
- DOD Business Systems Modernization : Important Management Controls Being Implemented on Major Navy Program, but Improvements Needed in Key Areas
- DOD Business Systems Modernization : Planned Investment in Navy Program To Create Cashless Shipboard Environment Needs To Be Justified and Better Managed
- DOD information security : serious weaknesses continue to place Defense operations at risk : report to the Secretary of Defense
- DOD's information assurance efforts
- Data Mining : Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks
- Data protection and the consumer : who loses when your data takes a hike? : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, May 23, 2006
- Data security & privacy law
- Data security and bug bounty programs : lessons learned from the Uber breach and security researchers : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifteenth Congress, second session, February 6, 2018
- Database nation : the death of privacy in the 21st century
- Defense Infrastructure : Full Costs and Security Implications of Cheyenne Mountain Realignment Have Not Been Determined
- Department of Homeland Security reauthorization and the President's fiscal year 2018 budget request : hearing before Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, June 7, 2017
- Department of Justice computer security, Bureau of Prison's sentry system : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, first session, September 11, 1991
- Digital rights management : technological, economic, legal and political aspects
- ECPA : lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013, Part I
- Electronic Communications Privacy Act (ECPA) : geolocation privacy and surveillance : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013, Part II
- Electronic government : planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives
- Emerging cyber threats to the United States : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, February 25, 2016
- Employee privacy : computer-use monitoring practices and policies of selected companies
- Encryption : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifth Congress, first session, March 19, 1997
- Encryption : individual right to privacy vs. national security : hearing before the Subcommittee on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Fifth Congress, first session, May 8, 1997
- Enhancing Grid Security through Public-Private Partnerships Act : report (to accompany H.R. 359)
- Enhancing and implementing the cybersecurity elements of the sector-specific plans : joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000
- Enhancing data security : the regulators' perspective : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 18, 2005
- Examining the evolving cyber insurance marketplace : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, March 19, 2015
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Exploring the feasibility and security of technology to conduct remote voting in the House : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, second session, July 17, 2020
- FEMA's longstanding IT deficiencies hindered 2017 response and recovery operations
- Failure of VA's information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006
- Federal Reserve Banks : Areas for Improvement in Information Security Controls
- Federal Reserve banks : areas for improvement in computer controls : report to the chairman of the Board of Governors of the Federal Reserve System
- Federal information security : actions needed to address widespread weaknesses : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform, House of Representatives
- Fighting fraud : improving information security : joint hearing before the Subcommittee on Financial Institutions and Consumer Credit and the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Eighth Congress, first session, April 3, 2003
- Filesharing programs and "technological features to induce users to share" : a report to the United States Patent and Trademark Office from the Office of International Relations, Prepared by Thomas D. Sydnor II, John Knight, Lee A. Hollaar
- Foreign affairs : effort to upgrade information technology overseas faces formidable challenges : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on International Relations, House of Representatives
- Fourth Amendment and the Internet : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000
- Fourth amendment issues raised by the FBI's "Carnivore" program : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session
- Government Information Security Act of 1999 : report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1993, to reform government information security by strengthening information security practices throughout the federal government
- H.R. 2413, the Computer Security Enhancement Act of 1999 : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, first session, September 30, 1999
- Harvesting American Cybersecurity Knowledge through Education Act of 2019 : report of the Committee on Commerce, Science, and Transportation on S. 2775
- Health Information Technology : HHS Has Taken Important Steps To Address Privacy Principles and Challenges, Although More Work Remains
- Hearing II on information technology : hearing before the Subcommittee [on] Oversight and Investigations of the Committee on Veterans' Affairs, House of Representatives, One Hundred Sixth Congress, second session, September 21, 2000
- Hearing III on information technology : hearing before the Subcommittee [on] Oversight and Investigations of the Committee on Veterans' Affairs, House of Representatives, One Hundred Seventh Congress, first session, April 4, 2001
- Hearing on the repeated failures of VA's information technology management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 14, 2006
- Homeland security : the federal and New York response : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- How secure is sensitive Commerce Department data and operations? : a review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001
- How to comply with the children's online privacy protection rule
- How your computer can get you in trouble
- IRS systems security : although significant improvements made, tax processing operations and data still at serious risk : report to the Committee on Governmental Affairs, U.S. Senate
- IRS systems security : tax processing operations and data still at risk due to serious weaknesses : report to the ranking minority member, Committee on Governmental Affairs, U.S. Senate
- IRS systems security : tax processing operations and data still at risk due to serious weaknesses : statement of Rona B. Stillman, Chief Scientist, Computers and Telecommunications, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate
- IRS systems security and funding : additional information on employee browsing and tax systems modernization
- IRS systems security and funding : employee browsing not being addressed effectively and budget requests for new systems development not justified : statement of Rona B. Stillman, Chief Scientist, Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Treasury and General Government, Committee on Appropriations, United States Senate
- Identity theft : innovative solutions for an evolving problem : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, first session, March 21, 2007
- Identity theft : recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005
- Identity theft : the causes, costs, consequences, and potential solutions : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 22, 2004
- Impact and policy implications of spyware on consumers and businesses : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008
- Implementation of the USA Patriot Act : crime, terrorism and the age of technology : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, first session, April 21, 2005
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Improvements in patch and configuration management controls can better protect TSA's wireless network and devices : redacted
- Inadvertent file sharing over peer-to-peer networks : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007
- Inadvertent file sharing over peer-to-peer networks : how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009
- Industry speaks on cybersecurity : hearing of [sic] the Subcommittee on Cybersecurity, Science, and Research and Development before [sic] the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 15, 2003
- Information Assurance : National Partnership Offers Benefits, but Faces Considerable Challenges
- Information Security : Actions Needed To Better Protect Los Alamos National Laboratory's Unclassified Computer Network
- Information Security : Agencies Need To Develop and Implement Adequate Policies for Periodic Testing
- Information Security : Continued Progress Needed To Strengthen Controls at the Internal Revenue Service
- Information Security : Coordination of Federal Cyber Security Research and Development
- Information Security : Department of Health and Human Services Needs To Fully Implement Its Program
- Information Security : Despite Reported Progress, Federal Agencies Need To Address Persistent Weaknesses
- Information Security : FBI Needs To Address Weaknesses in Critical Network
- Information Security : FDIC Sustains Progress but Needs To Improve Configuration Management of Key Financial Systems
- Information Security : Federal Agency Efforts To Encrypt Sensitive Information Are Under Way, but Work Remains
- Information Security : Federal Deposit Insurance Corporation Needs To Improve Its Program
- Information Security : Federal Deposit Insurance Corporation Needs To Sustain Progress Improving Its Program
- Information Security : Further Efforts Needed To Address Significant Weaknesses at the Internal Revenue Service
- Information Security : IRS Needs To Address Pervasive Weaknesses
- Information Security : Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk
- Information Security : Protecting Personally Identifiable Information
- Information Security : Securities and Exchange Commission Needs To Address Weak Controls over Financial and Sensitive Data
- Information Security : Securities and Exchange Commission Needs To Continue To Improve Its Program
- Information Security : Securities and Exchange Commission Needs To Continue To Improve Its Program
- Information Security : Selected Departments Need To Address Challenges in Implementing Statutory Requirements
- Information Security : Sustained Management Commitment and Oversight Are Vital to Resolving Long-Standing Weaknesses at the Department of Veterans Affairs
- Information Security : Sustained Progress Needed To Strengthen Controls at the Securities and Exchange Commission
- Information Security : TVA Needs To Address Weaknesses in Control Systems and Networks
- Information security : "ILOVEYOU" Computer virus emphasizes critical need for agency and governmentwide improvements : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives
- Information security : Code Red, Code Red II, and SirCam attacks highlight need for proactive measures
- Information security : NRC's computer intrusion detection capabilities
- Information security : SSA's computer intrusion detection capabilities
- Information security : additional actions needed to fully implement reform legislation
- Information security : additional actions needed to fully implement reform legislation
- Information security : challenges to improving DOD's incident response capabilities
- Information security : continued efforts needed to fully implement statutory requirements : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform
- Information security : further efforts needed to fully implement statutory requirements in DOD : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Terrorism, Unconventional Threats and Capabilities, Committee on Armed Services, House of Representatives
- Information security : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998
- Information security : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998
- Information security : progress made, but challenges remain to protect federal systems and the nation's critical infrastructures
- Information security : progress made, but weaknesses at the Internal Revenue Service continue to pose risks
- Information security : progress reported, but weaknesses at federal agencies persist : testimony before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information security : serious weaknesses place critical federal operations and assets at risk : report to the Committee on Governmental Affairs, U.S. Senate
- Information security : software change controls at the Department of Transportation
- Information security : subcommittee questions concerning the Melissa computer virus
- Information security : the proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives
- Information security : weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives
- Information security for in-house counsel : reducing the risk of liability from hacks, attacks, and other threats to information
- Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information systems : VA computer control weaknesses increase risk of fraud, misuse, and improper disclosure : report to the Secretary of Veterans Affairs
- Information systems : the status of computer security at the Department of Veterans Affairs : report to the secretary of Veterans Affairs
- Information technology : comments on proposed OMB guidance for implementing the Government Paperwork Elimination Act
- Information technology litigation : law and analysis
- Internet Protocol Version 6 : Federal Government in Early Stages of Transition and Key Challenges Remain
- Internet security : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000
- Investigating and prosecuting 21st century cyber threats : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Issues Associated with the Global Information Grid Bandwidth Expansion
- Lessons learned from the Government Information Security Reform Act of 2000 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002
- Locking your cyber front door : the challenges facing home users and small businesses : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 16, 2004
- Making federal computers secure : overseeing effective information security management : third report
- Managing Sensitive Information : Departments of Energy and Defense Policies and Oversight Could Be Improved
- Managing the challenges of the information age : issue area plan : fiscal years 1998-2000
- Meeting the need for inter-operability and information security in health IT : hearing before the Committee on Science and Technology, House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007
- Millennium Digital Commerce Act : report of the Committee on Commerce, Science, and Transportation on S. 761
- Millennium Digital Commerce Act, S. 761 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999
- National Cyber Awareness System
- National Institute of Standards and Technology Reauthorization Act of 2018 : report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- National information policy : report to the President of the United States
- Open hearing : National Security Agency activities and its ability to meet its diverse mission requirements : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fourtenth Congress, first session, Thursday, September 24, 2015
- Open hearing on the intelligence community's assessment on Russian activities and intentions in the 2016 U.S. elections : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, first session, Tuesday, January 10, 2017
- Overexposed : the threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003
- Oversight and authorization of the Justice Management Division, U.S. Department of Justice : hearing before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, first session, June 27, 1991
- Oversight hearing on Veterans Benefits Administration data security : joint hearing before the Committee on Veterans' Affairs, House of Representatives, Subcommittee on Economic Opportunity and the Subcommittee on Disability Assistance and Memorial Affairs, One Hundred Ninth Congress, second session, June 20, 2006
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- Oversight of the State Department : technology modernization and computer security : hearing before the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, second session, June 22, 2000
- Overview of the cyber problem : a nation dependent and dealing with risk : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, June 22, 2003
- Overview of the cyber problem : a nation dependent and dealing with risk : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, June 22, 2003
- Personal information : data breaches are frequent, but evidence of resulting identity theft is limited, however, the full extent is unknown : report to congressional requesters
- Personal information : data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown : report to congressional requesters
- Planning for the future of cyber attack attribution : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
- Preparing for the future : an assessment of emerging cyber threats : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, October 22, 2019
- Privacy : Lessons Learned About Data Breach Notification
- Privacy and electronic communications : hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, May 18, 2000
- Promoting and incentivizing cybersecurity best practices : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- Protect your workplace, guidance on physical and cyber security and reporting of suspicious behavior, activity, and cyber incidents
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting maritime facilities in the 21st century : are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
- Protecting our nation's cyber space : educational awareness for the cyber citizen : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting small businesses against emerging and complex cyber-attacks : hearing before the Subcommittee on Health and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 21, 2013
- Protecting the electric grid from cybersecurity threats : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, second session, September 11, 2008
- Public switched network security assessment guidelines
- Resiliency : the electric grid's only hope : hearing before the Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, October 3, 2017
- Responses to questions on FAA's computer security and year 2000 program
- Review of CBP's major cybersecurity incident during a 2019 biometric pilot
- Review of the Department of Homeland Security's capability to share cyber threat information : redacted
- SCADA systems and the terrorist threat : protecting the nation's critical control systems : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity with the Subcommittee on Emergency Preparedness, Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, October 18, 2005
- Scholars or spies : foreign plots targeting America's research and development : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Securing consumers' data : options following security breaches : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, May 11, 2005
- Securing electronic personal data : striking a balance between privacy and commercial and governmental use : hearing before the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, first session, April 13, 2005
- Security in cyberspace : hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fourth Congress, second session, May 22, June 5, 25, and July 16, 1996
- Security in the Information Age : New Challenges, New Strategies
- Security in the information age : new challenges, new strategies : compendium of papers submitted to the Joint Economic Committee, Congress of the United States
- Security in the information age : new challenges, new strategies : compendium of papers submitted to the Joint Economic Committee, Congress of the United States
- Social Security Administration : Internet access to personal earnings and benefits information : statement of Joel C. Willemssen, Director, Information Resources Management and Keith A. Rhodes, Technical Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives
- Social Security Administration : responses to subcommittee questions about the on-line PEBES service
- Social Security Numbers Are Widely Available in Bulk and Online Records, but Changes To Enhance Security Are Occurring
- Staff Report : Agency Data Breaches Since Jan. 1, 2003
- State and local government series : information security
- Status of the 1990 decennial census
- Stop, think, click : 7 practices for safer computing
- Strengthening U.S. cybersecurity capabilities : hearing before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, February 14, 2017
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Technology assessment : cybersecurity for critical infrastructure protection
- Technology development at the Federal Aviation Administration : computer and information technology challenges of the 21st century : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, second session, August 6, 1998
- Telecommunications and SCADA : secure links or open portals to the security of our nation's critical infrastructure? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 30, 2004
- Test results for hardware write block device : tableau T8 forensic USB bridge (USB interface)
- Test results for hardware write block device : tableau T8 forensic USB bridge (firewire interface)
- Test results for mobile device acquisition tool : Susteen DataPilot Secure View 1.8.0
- Test results for software write block tools, RCMP HDL VO.8
- The "ILOVEYOU" virus and its impact on the U.S. financial services industry : hearing before the Subcommittee on Financial Insitutions of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixth Congress, second session ... May 18, 2000
- The "ILOVEYOU" virus and its impact on the U.S. financial services industry : hearing before the Subcommittee on Financial Institutions of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixth Congress, second session ... May 18, 2000
- The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals
- The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999
- The U.S. SAFE WEB act : the first three years : a report to Congress
- The administration's clipper chip key escrow encryption program : hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Third Congress, second session ... May 3, 1994
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The current state of private-sector engagement for cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 9, 2017
- The dark side of a bright idea : could personal and national security risks compromise the potential of peer-to-peer file-sharing networks? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, first session, June 17, 2003
- The electronic privacy papers : documents on the battle for privacy in the age of surveillance
- The encryption tightrope : balancing Americans' security and privacy : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, second session, March 1, 2016
- The evolution of energy infrastructure in the United States and how lessons learned from the past can inform future opportunities : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Fifteenth Congress, second session, February 8, 2018
- The future of electricity delivery : modernizing and securing our nation's electricity grid : hearing before the Subcommittee on Energy, Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, first session, July 17, 2019
- The invisible battleground : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 16, 2003
- The lure : the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals
- The need for privacy protections : perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012
- The road to 2020 : defending against election interference : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, November 19, 2019
- The role of computer security in protecting U.S. infrastructures : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, November 6, 1997
- The role of small businesses in strengthening cybersecurity efforts in the United States : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Twelfth Congress, first session, July 25, 2011
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The state of small business security in a cyber economy : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006
- The status and outlook for cybersecurity efforts in the energy industry : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixteenth Congress, first session, February 14, 2019
- The unwanted gaze : the destruction of privacy in America
- USSS faces challenges protecting sensitive case management systems and data
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2016
- Understanding the cybersecurity of America's aviation sector : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Transportation and Protective Security of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, September 6, 2018
- Update on the breach of data security at the Department of Veterans Affairs : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 29, 2006
- VA information systems : the Austin Automation Center has made progress in improving information system controls : report to the Acting Chief Information Officer and the Director of the Austin Automation Center, Department of Veteran[s] Affairs
- VA information technology : important initiatives begun, yet serious vulnerabilities persist : statement of David L. McClure, Director, Information Technology Management Issues, before the Subcommittee on Oversight and Investigations, Committee on Veterans' Affairs, House of Representatives
- Veterans Affairs : Continued Action Needed To Reduce IT Equipment Losses and Correct Control Weaknesses
- Virtual threat, real terror : cyberterrorism in the 21st century : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, second session, February 24, 2004
- Vulnerabilities highlight the need for more effective web security management
- Weak computer security in government : is the public at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, May 19, 1998
- Which VA IT organizational structure would have best prevented VA's "meltdown" in information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 28, 2006
- Who goes there? : authentication through the lens of privacy
- Who might be lurking at your cyber front door? Is your system really secure? : strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004
- Worm and virus defense : how can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003
- You've got mail, but is is secure? : an examination of Internet vulnerabilities affecting businesses, governments and homes : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 16, 2003
- You've got mail, but is it secure? : an examination of Internet vulnerabilities affecting businesses, governments and homes : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 16, 2003
- You've got mail, but is it secure? : an examination of Internet vulnerabilities affecting businesses, governments and homes : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 16, 2003
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/tdgvY5C8Nd4/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/tdgvY5C8Nd4/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>