Books on the topic 'Computers – Access control – United States'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computers – Access control – United States.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. Washington, D.C: U.S. General Accounting Office, 1991.
Find full textOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.
Find full textUnited States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Washington, D.C: Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.
Find full textUnited States. General Accounting Office, ed. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. Washington, D.C.]: The Office, 2000.
Find full textOffice, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. Washington, D.C: The Office, 1988.
Find full textBrock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.
Find full textBrock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.
Find full textBrock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. [Washington, D.C.]: The Office, 2000.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.
Find full textGuard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 26, 1996. Washington: U.S. G.P.O., 1996.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE Act": Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 12, 1996. Washington: U.S. G.P.O., 1996.
Find full textMcClure, David L. Information security: Fundamental weaknesses place EPA data and operations at risk : statement of David L. McClure, Associate Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division. [Washington, D.C.]: The Office, 2000.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. Information security: Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998. Washington: U.S. G.P.O., 1998.
Find full textOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Find full textUnited States. Dept. of the Treasury. and United States. General Accounting Office., eds. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C: The Office, 1998.
Find full textOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 ... Washington: U.S. G.P.O., 1988.
Find full textGuard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Find full textUnited States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution. Fourth amendment issues raised by the FBI's "Carnivore" program: Hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session. Washington, D.C: U.S. G.P.O., 2000.
Find full textRothfeder, Jeffrey. Privacy for sale: How computerization has made everyone's private life an open secret. New York: Simon & Schuster, 1992.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Improved administration can enhance Federal Emergency Management Agency classified laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, 2007.
Find full textH, Anderson Robert. The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures: What can/should the DOD do? Santa Monica, Calif: RAND, 1998.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Commerce. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Division, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office, ed. Information security: Weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. Washington, D.C.]: The Office, 2001.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Hacking the homeland: Investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. National Security Agency/Central Security Service. Information Assurance Directorate, ed. KMI: Key management infrastructure. [Fort George G. Meade, Md.?]: U.S. National Security Agency, Information Assurance Directorate, 2002.
Find full textForces, National Research Council (U S. ). Committee on Information Assurance for Network-Centric Naval. Information assurance for network-centric naval forces. Washington, D.C: National Academies Press, 2010.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Improved administration can enhance science and technology laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.
Find full textUnited, States Congress House Committee on Science Space and Technology Subcommittee on Technology and Competitiveness. Computer Security Act of 1987: Report. Washington: U.S. G.P.O., 1992.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Answers to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Progress has been made in securing laptops and wireless networks at FEMA. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.
Find full textUnited States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Military and civilian control of computer security issues: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, first session, May 4, 1989. Washington: U.S. G.P.O., 1989.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the National Aeronautics and Space Administration. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Find full textDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Housing and Urban Development. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Health and Human Services. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on the Constitution, Federalism, and Property Rights. Privacy in the digital age: Encryption and mandatory access : hearing before the Subcommittee on the Constitution, Federalism, and Property Rights of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, second session ... March 17, 1998. Washington: U.S. G.P.O., 1998.
Find full textInvestigations, United States Congress House Committee on Energy and Commerce Subcommittee on Oversight and. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, May 23, 2001. Washington: U.S. G.P.O., 2001.
Find full text