Books on the topic 'Cyber security management tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cyber security management tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Cyber security essentials. Boca Raton: Auerbach Publications, 2010.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. [Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Find full textGustin, Joseph F. Cyber terrorism: A guide for facility managers. Lilburn, Ga: Fairmont Press, 2004.
Find full textScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Find full textCyber challenges and national security: Threats, opportunities, and power in a virtual world. Washington, D.C: Georgetown University Press, 2012.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Management controls over the Federal Energy Regulatory Commission's unclassified cyber security program, 2006. Washington, D.C: U.S. Department of Energy, Office of Inspector General, 2006.
Find full textCyber terrorism: Political and economic implications. Hershey, PA: Idea Group Pub., 2006.
Find full textCriminal major case management: Persons of Interest Priority Assessment Tool (POIPAT). Boca Raton: Taylor & Francis, 2012.
Find full textBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. Bellingham, Wash: SPIE, 2010.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.
Find full textWillemssen, Joel C. Critical infrastructure protection: Comments on the proposed Cyber Security Information Act of 2000 : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2000.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security. Cyber security: Recovery and reconstitution of critical networks : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, second session, July 28, 2006. Washington: U.S. G.P.O., 2007.
Find full textGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Cyber security: The status of information security and the effects of the Federal Information Security Management Act (FISMA) at federal agencies : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, June 24, 2003. Washington: U.S. G.P.O., 2004.
Find full textHarnessing small business innovation for national security cyber needs: Hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010. Washington: U.S. G.P.O., 2010.
Find full textOffice, General Accounting. Export controls: Sensitive machine tool exports to China. Washington, D.C: The Office, 1996.
Find full textMore security, less waste: What makes sense for our federal cyber defense : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Eleventh Congress, first session, October 29, 2009. Washington: U.S. G.P.O., 2010.
Find full textEmerging Threats and Capabilities United States. Congress. House. Committee on Armed Services. Subcommittee on Intelligence. Information technology and cyber operations: Modernization and policy issues to support the future force: hearing before the Subcommittee on Intelligence, Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 13, 2013. Washington: U.S. Government Printing Office, 2013.
Find full textInformation technology and cyber operations: Modernization and policy issues in a changing national security environment : hearing before the Subcommittee on Intelligence, Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Thirteenth Congress, second session, hearing held March 12, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies. Facilitating cyber threat information sharing and partnering with the private sector to protect critical infrastructure: An assessment of DHS capabilities : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, May 16, 2013. Washington: U.S. Government Printing Office, 2013.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, ed. Cyber incident response: Bridging the gap between cybersecurity and emergency management : joint hearing before the Subcommittee on Emergency Preparedness, Response and Communications and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, October 30, 2013. Washington: U.S. Government Printing Office, 2014.
Find full textUnderstanding the power of social media as a communication tool in the aftermath of disasters: Hearing before the Ad Hoc Subcommittee on Disaster Recovery and Intergovernmental Affairs of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, May 5, 2011. Washington: U.S. G.P.O., 2012.
Find full textH.R. 4246, the Cyber Security Information Act of 2000: An examination of issues involving public-private partnerships for critical infrastructures : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 4246 ... June 22, 2000. Washington: U.S. G.P.O., 2001.
Find full textHearing on National Defense Authorization Act for Fiscal Year 2012 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session: Subcommittee on Emerging Threats and Capabilities hearing on budget request for U.S. Cyber Command, hearing held March 16, 2011. Washington: U.S. G.P.O., 2011.
Find full textOffice, General Accounting. Export controls: National security issues and foreign availability for high performance computer exports : report to congressional committees. Washington, D.C (P.O. Box 37050 Washington 20013): The Office, 1998.
Find full textOffice, General Accounting. Export controls: Sale of telecommunications equipment to China : report to the Chairman, Committee on National Security, House of Representatives. Washington, D.C: The Office, 1996.
Find full textOffice, General Accounting. Export controls: Sale of telecommunications equipment to China : report to the Chairman, Committee on National Security, House of Representatives. Washington, D.C: The Office, 1996.
Find full textOffice, General Accounting. Export controls: Better interagency coordination needed on satellite exports : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: U.S. General Accounting Office, 1999.
Find full textOffice, General Accounting. Export controls: Information on the decision to revise high performance computer controls : report to the Chairman, Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050 Washington 20013): The Office, 1998.
Find full textOffice, General Accounting. Export controls: Department of Commerce Controls over transfers of technology to foreign nationals need improvement : report to the chairman, Subcomittee on National Security, Veterans Affairs, and International relations, Committee on Government Reform, House of Representatives. Washington D.C: United States General Accounting Office, 2002.
Find full textOffice, General Accounting. Export controls: License screening and compliance procedures need strengthening : report to the Chairman, Subcommittee on Federal Services, Post Office and Civil Service, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: U.S. General Accounting Office, 1994.
Find full textOffice, General Accounting. Export controls: System for controlling exports of high performance computing is ineffective : report to the chairman, Committee on Armed Services, U.S. Senate. Washington, D.C: GAO, 2000.
Find full textOffice, General Accounting. Export controls: 1998 legislative mandate for high performance computers : report to the Chairman and Ranking Minority Member, Committee on Armed Services, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 1999.
Find full textOffice, General Accounting. Export controls: Reengineering business processes can improve efficiency of state department license reviews : report to the Chairman and Ranking Minority Memeber, Subcommittee on Readiness and Managemnet Support, Committee on Armed Services, U.S. Senate. Washington D.C: United States General Accounting Office, 2001.
Find full textOffice, General Accounting. Export controls: Multilateral efforts to improve enforcement : report to the Subcommittee on International Economic Policy and Trade, Committee on Foreign Affairs, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1992.
Find full textOffice, General Accounting. Export controls: Statutory reporting requirements for computers not fully addressed : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Export controls: Rapid advances in China's semiconductor industry underscore need for fundamental U.S. policy review : report to the ranking minority member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (441 G St., NW, Room LM, Washington 20548): GAO, 2002.
Find full textOffice, General Accounting. Export controls: Change in export licensing jurisdiction for two sensitive dual-use items : report to congressional requesters. Washington, D.C: The Office, 1997.
Find full textOffice, General Accounting. Export controls: Concerns over stealth-related exports : report to the Chairman, Subcommittee on Acquisition and Technology, Committee on Armed Services, U.S. Senate. Washington, D.C: The Office, 1995.
Find full textOffice, General Accounting. Export controls: Actions needed to improve enforcement : report to the Chairman, Subcommittee on Economic Policy, Trade and the Environment, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1993.
Find full textOffice, General Accounting. Export controls: Assessment of Commerce Department's foreign policy report to Congress : report to the Congress. Washington, D.C: The Office, 1986.
Find full textOffice, General Accounting. Export controls: Issues in removing militarily sensitive items from the munitions list : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Find full textOffice, General Accounting. Export controls: Assessment of Commerce Department's report on missile technology controls : report to the Congress. Washington, D.C: The Office, 1988.
Find full textOffice, General Accounting. Export controls: U.S. controls on trade with selected Middle Eastern countries : fact sheet for the Chairman, Subcommittee on Oversight, Committee on Ways and Means, House of Representatives. Washington, D.C: U.S. General Accounting Office, 1991.
Find full textOffice, General Accounting. Export controls: Post-shipment verification provides limited assurance that dual-use items are being properly used : report to Senator Jon Kyl, U.S. Senate. Washington, D.C. (441 G St., NW, Room LM, Washington 20548): GAO, 2004.
Find full textTrim, Peter, and Yang-Im Lee. Cyber Security Management. Routledge, 2016. http://dx.doi.org/10.4324/9781315575698.
Full textLee, Yang-Im, and Peter R. J. Trim. Cyber Security Management. Taylor & Francis Group, 2020.
Find full textThe NICE Cyber Security Framework: Cyber Security Management. Springer, 2020.
Find full textCarnovale, Steven, and Sengun Yeniyurt. Cyber Security and Supply Chain Management. WORLD SCIENTIFIC, 2021. http://dx.doi.org/10.1142/12140.
Full text