Livros sobre o tema "Computers – Access control – United States"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Computers – Access control – United States".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. Washington, D.C: U.S. General Accounting Office, 1991.
Encontre o texto completo da fonteOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.
Encontre o texto completo da fonteUnited States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Washington, D.C: Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.
Encontre o texto completo da fonteUnited States. General Accounting Office, ed. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. Washington, D.C.]: The Office, 2000.
Encontre o texto completo da fonteOffice, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. Washington, D.C: The Office, 1988.
Encontre o texto completo da fonteBrock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.
Encontre o texto completo da fonteBrock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.
Encontre o texto completo da fonteBrock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. [Washington, D.C.]: The Office, 2000.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.
Encontre o texto completo da fonteGuard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 26, 1996. Washington: U.S. G.P.O., 1996.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE Act": Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 12, 1996. Washington: U.S. G.P.O., 1996.
Encontre o texto completo da fonteMcClure, David L. Information security: Fundamental weaknesses place EPA data and operations at risk : statement of David L. McClure, Associate Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division. [Washington, D.C.]: The Office, 2000.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Governmental Affairs. Information security: Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998. Washington: U.S. G.P.O., 1998.
Encontre o texto completo da fonteOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Encontre o texto completo da fonteUnited States. Dept. of the Treasury. e United States. General Accounting Office., eds. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C: The Office, 1998.
Encontre o texto completo da fonteOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteOffice, General Accounting. Bureau of the Public Debt: Areas for improvement in computer controls : report to the Secretary of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 ... Washington: U.S. G.P.O., 1988.
Encontre o texto completo da fonteGuard, United States Coast. Automated information systems (AIS) security manual. [Washington, D.C.]: U.S. Dept. of Transportation, U.S. Coast Guard, 1987.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution. Fourth amendment issues raised by the FBI's "Carnivore" program: Hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session. Washington, D.C: U.S. G.P.O., 2000.
Encontre o texto completo da fonteRothfeder, Jeffrey. Privacy for sale: How computerization has made everyone's private life an open secret. New York: Simon & Schuster, 1992.
Encontre o texto completo da fonteUnited States. Department of Homeland Security. Office of Inspector General. Improved administration can enhance Federal Emergency Management Agency classified laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, 2007.
Encontre o texto completo da fonteH, Anderson Robert. The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures: What can/should the DOD do? Santa Monica, Calif: RAND, 1998.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Commerce. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Division, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office, ed. Information security: Weaknesses place commerce data and operations at serious risk : statement of Robert F. Dacey, Director, Information Security Issues, before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. Washington, D.C.]: The Office, 2001.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Hacking the homeland: Investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007. Washington: U.S. G.P.O., 2009.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: NRC's computer intrusion detection capabilities. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Encontre o texto completo da fonteUnited States. National Security Agency/Central Security Service. Information Assurance Directorate, ed. KMI: Key management infrastructure. [Fort George G. Meade, Md.?]: U.S. National Security Agency, Information Assurance Directorate, 2002.
Encontre o texto completo da fonteForces, National Research Council (U S. ). Committee on Information Assurance for Network-Centric Naval. Information assurance for network-centric naval forces. Washington, D.C: National Academies Press, 2010.
Encontre o texto completo da fonteUnited States. Department of Homeland Security. Office of Inspector General. Office of Information Technology. Improved administration can enhance science and technology laptop computer security. Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2006.
Encontre o texto completo da fonteUnited, States Congress House Committee on Science Space and Technology Subcommittee on Technology and Competitiveness. Computer Security Act of 1987: Report. Washington: U.S. G.P.O., 1992.
Encontre o texto completo da fonteDivision, United States General Accounting Office Accounting and Information Management. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Responses to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Answers to posthearing questions. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Encontre o texto completo da fonteUnited States. Department of Homeland Security. Office of Inspector General. Progress has been made in securing laptops and wireless networks at FEMA. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Military and civilian control of computer security issues: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, first session, May 4, 1989. Washington: U.S. G.P.O., 1989.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the National Aeronautics and Space Administration. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Encontre o texto completo da fonteDivision, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Housing and Urban Development. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Health and Human Services. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on the Constitution, Federalism, and Property Rights. Privacy in the digital age: Encryption and mandatory access : hearing before the Subcommittee on the Constitution, Federalism, and Property Rights of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, second session ... March 17, 1998. Washington: U.S. G.P.O., 1998.
Encontre o texto completo da fonteInvestigations, United States Congress House Committee on Energy and Commerce Subcommittee on Oversight and. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, May 23, 2001. Washington: U.S. G.P.O., 2001.
Encontre o texto completo da fonte