Bücher zum Thema „Computers – Access control – United States“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computers – Access control – United States.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Computers – Access control – United States" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. Washington, D.C: U.S. General Accounting Office, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

United States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Washington, D.C: Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

United States. General Accounting Office, Hrsg. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. Washington, D.C.]: The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Office, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. Washington, D.C: The Office, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Brock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Brock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Brock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. [Washington, D.C.]: The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

United States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

United States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Guard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 26, 1996. Washington: U.S. G.P.O., 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE Act": Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 12, 1996. Washington: U.S. G.P.O., 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

McClure, David L. Information security: Fundamental weaknesses place EPA data and operations at risk : statement of David L. McClure, Associate Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division. [Washington, D.C.]: The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

United States. Congress. Senate. Committee on Governmental Affairs. Information security: Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998. Washington: U.S. G.P.O., 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Office, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

United States. Dept. of the Treasury. und United States. General Accounting Office., Hrsg. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C: The Office, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Office, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Office, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

United States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 ... Washington: U.S. G.P.O., 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Guard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution. Fourth amendment issues raised by the FBI's "Carnivore" program: Hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session. Washington, D.C: U.S. G.P.O., 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Rothfeder, Jeffrey. Privacy for sale: How computerization has made everyone's private life an open secret. New York: Simon & Schuster, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

United States. Department of Homeland Security. Office of Inspector General. Improved administration can enhance Federal Emergency Management Agency classified laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

H, Anderson Robert. The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures: What can/should the DOD do? Santa Monica, Calif: RAND, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Commerce. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Division, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

United States. General Accounting Office, Hrsg. Information security: Weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. Washington, D.C.]: The Office, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Hacking the homeland: Investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007. Washington: U.S. G.P.O., 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

United States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

United States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

United States. National Security Agency/Central Security Service. Information Assurance Directorate, Hrsg. KMI: Key management infrastructure. [Fort George G. Meade, Md.?]: U.S. National Security Agency, Information Assurance Directorate, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Forces, National Research Council (U S. ). Committee on Information Assurance for Network-Centric Naval. Information assurance for network-centric naval forces. Washington, D.C: National Academies Press, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

United States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Improved administration can enhance science and technology laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

United, States Congress House Committee on Science Space and Technology Subcommittee on Technology and Competitiveness. Computer Security Act of 1987: Report. Washington: U.S. G.P.O., 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Division, United States General Accounting Office Accounting and Information Management. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

United States. General Accounting Office. Accounting and Information Management Division. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

United States. General Accounting Office. Accounting and Information Management Division. Information security: Answers to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

United States. Department of Homeland Security. Office of Inspector General. Progress has been made in securing laptops and wireless networks at FEMA. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Military and civilian control of computer security issues: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, first session, May 4, 1989. Washington: U.S. G.P.O., 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the National Aeronautics and Space Administration. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Housing and Urban Development. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Health and Human Services. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on the Constitution, Federalism, and Property Rights. Privacy in the digital age: Encryption and mandatory access : hearing before the Subcommittee on the Constitution, Federalism, and Property Rights of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, second session ... March 17, 1998. Washington: U.S. G.P.O., 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Investigations, United States Congress House Committee on Energy and Commerce Subcommittee on Oversight and. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, May 23, 2001. Washington: U.S. G.P.O., 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie