Bücher zum Thema „Cyber security management tool“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Cyber security management tool" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Cyber security essentials. Boca Raton: Auerbach Publications, 2010.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. [Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Den vollen Inhalt der Quelle findenGustin, Joseph F. Cyber terrorism: A guide for facility managers. Lilburn, Ga: Fairmont Press, 2004.
Den vollen Inhalt der Quelle findenScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Den vollen Inhalt der Quelle findenCyber challenges and national security: Threats, opportunities, and power in a virtual world. Washington, D.C: Georgetown University Press, 2012.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Management controls over the Federal Energy Regulatory Commission's unclassified cyber security program, 2006. Washington, D.C: U.S. Department of Energy, Office of Inspector General, 2006.
Den vollen Inhalt der Quelle findenCyber terrorism: Political and economic implications. Hershey, PA: Idea Group Pub., 2006.
Den vollen Inhalt der Quelle findenCriminal major case management: Persons of Interest Priority Assessment Tool (POIPAT). Boca Raton: Taylor & Francis, 2012.
Den vollen Inhalt der Quelle findenBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. Bellingham, Wash: SPIE, 2010.
Den vollen Inhalt der Quelle findenUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.
Den vollen Inhalt der Quelle findenWillemssen, Joel C. Critical infrastructure protection: Comments on the proposed Cyber Security Information Act of 2000 : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2000.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security. Cyber security: Recovery and reconstitution of critical networks : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, second session, July 28, 2006. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Cyber security: The status of information security and the effects of the Federal Information Security Management Act (FISMA) at federal agencies : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, June 24, 2003. Washington: U.S. G.P.O., 2004.
Den vollen Inhalt der Quelle findenHarnessing small business innovation for national security cyber needs: Hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010. Washington: U.S. G.P.O., 2010.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Sensitive machine tool exports to China. Washington, D.C: The Office, 1996.
Den vollen Inhalt der Quelle findenMore security, less waste: What makes sense for our federal cyber defense : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Eleventh Congress, first session, October 29, 2009. Washington: U.S. G.P.O., 2010.
Den vollen Inhalt der Quelle findenEmerging Threats and Capabilities United States. Congress. House. Committee on Armed Services. Subcommittee on Intelligence. Information technology and cyber operations: Modernization and policy issues to support the future force: hearing before the Subcommittee on Intelligence, Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 13, 2013. Washington: U.S. Government Printing Office, 2013.
Den vollen Inhalt der Quelle findenInformation technology and cyber operations: Modernization and policy issues in a changing national security environment : hearing before the Subcommittee on Intelligence, Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Thirteenth Congress, second session, hearing held March 12, 2014. Washington: U.S. Government Printing Office, 2014.
Den vollen Inhalt der Quelle findenUnited, States Congress House Committee on Homeland Security Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies. Facilitating cyber threat information sharing and partnering with the private sector to protect critical infrastructure: An assessment of DHS capabilities : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, May 16, 2013. Washington: U.S. Government Printing Office, 2013.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Hrsg. Cyber incident response: Bridging the gap between cybersecurity and emergency management : joint hearing before the Subcommittee on Emergency Preparedness, Response and Communications and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, October 30, 2013. Washington: U.S. Government Printing Office, 2014.
Den vollen Inhalt der Quelle findenUnderstanding the power of social media as a communication tool in the aftermath of disasters: Hearing before the Ad Hoc Subcommittee on Disaster Recovery and Intergovernmental Affairs of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, May 5, 2011. Washington: U.S. G.P.O., 2012.
Den vollen Inhalt der Quelle findenH.R. 4246, the Cyber Security Information Act of 2000: An examination of issues involving public-private partnerships for critical infrastructures : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 4246 ... June 22, 2000. Washington: U.S. G.P.O., 2001.
Den vollen Inhalt der Quelle findenHearing on National Defense Authorization Act for Fiscal Year 2012 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session: Subcommittee on Emerging Threats and Capabilities hearing on budget request for U.S. Cyber Command, hearing held March 16, 2011. Washington: U.S. G.P.O., 2011.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: National security issues and foreign availability for high performance computer exports : report to congressional committees. Washington, D.C (P.O. Box 37050 Washington 20013): The Office, 1998.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Sale of telecommunications equipment to China : report to the Chairman, Committee on National Security, House of Representatives. Washington, D.C: The Office, 1996.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Sale of telecommunications equipment to China : report to the Chairman, Committee on National Security, House of Representatives. Washington, D.C: The Office, 1996.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Better interagency coordination needed on satellite exports : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: U.S. General Accounting Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Information on the decision to revise high performance computer controls : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050 Washington 20013): The Office, 1998.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Department of Commerce Controls over transfers of technology to foreign nationals need improvement : report to the chairman, Subcomittee on National Security, Veterans Affairs, and International relations, Committee on Government Reform, House of Representatives. Washington D.C: United States General Accounting Office, 2002.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: License screening and compliance procedures need strengthening : report to the Chairman, Subcommittee on Federal Services, Post Office and Civil Service, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: U.S. General Accounting Office, 1994.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: System for controlling exports of high performance computing is ineffective : report to the chairman, Committee on Armed Services, U.S. Senate. Washington, D.C: GAO, 2000.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: 1998 legislative mandate for high performance computers : report to the Chairman and Ranking Minority Member, Committee on Armed Services, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Reengineering business processes can improve efficiency of state department license reviews : report to the Chairman and Ranking Minority Memeber, Subcommittee on Readiness and Managemnet Support, Committee on Armed Services, U.S. Senate. Washington D.C: United States General Accounting Office, 2001.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Multilateral efforts to improve enforcement : report to the Subcommittee on International Economic Policy and Trade, Committee on Foreign Affairs, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1992.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Statutory reporting requirements for computers not fully addressed : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Rapid advances in China's semiconductor industry underscore need for fundamental U.S. policy review : report to the ranking minority member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (441 G St., NW, Room LM, Washington 20548): GAO, 2002.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Change in export licensing jurisdiction for two sensitive dual-use items : report to congressional requesters. Washington, D.C: The Office, 1997.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Concerns over stealth-related exports : report to the Chairman, Subcommittee on Acquisition and Technology, Committee on Armed Services, U.S. Senate. Washington, D.C: The Office, 1995.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Actions needed to improve enforcement : report to the Chairman, Subcommittee on Economic Policy, Trade and the Environment, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1993.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Assessment of Commerce Department's foreign policy report to Congress : report to the Congress. Washington, D.C: The Office, 1986.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Issues in removing militarily sensitive items from the munitions list : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Assessment of Commerce Department's report on missile technology controls : report to the Congress. Washington, D.C: The Office, 1988.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: U.S. controls on trade with selected Middle Eastern countries : fact sheet for the Chairman, Subcommittee on Oversight, Committee on Ways and Means, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1991.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Export controls: Post-shipment verification provides limited assurance that dual-use items are being properly used : report to Senator Jon Kyl, U.S. Senate. Washington, D.C. (441 G St., NW, Room LM, Washington 20548): GAO, 2004.
Den vollen Inhalt der Quelle findenTrim, Peter, und Yang-Im Lee. Cyber Security Management. Routledge, 2016. http://dx.doi.org/10.4324/9781315575698.
Der volle Inhalt der QuelleLee, Yang-Im, und Peter R. J. Trim. Cyber Security Management. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenThe NICE Cyber Security Framework: Cyber Security Management. Springer, 2020.
Den vollen Inhalt der Quelle findenCarnovale, Steven, und Sengun Yeniyurt. Cyber Security and Supply Chain Management. WORLD SCIENTIFIC, 2021. http://dx.doi.org/10.1142/12140.
Der volle Inhalt der Quelle