Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Environmental Topics
Laws & Regulations
About EPA
Menu
Environmental Topics
Laws & Regulations
About EPA
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 29
Showing: Items 1 - 29
Your Search: (SUBJECT=Computer networks Security measures)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
Select Item
Title
Year Published
1
Apache cookbook /
2008
2
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
2016
3
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
4
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
5
At a Glance : EPA Has Taken Steps to Address Cyber Threats but Key Actions Remain Incomplete.
2011
6
At a Glance : Improved Security Planning Needed for the Customer Technology Solutions Project.
2009
7
At a Glance : Management Alert: EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information.
2018
8
At a Glance : Management of EPA Headquarters Internet Protocol Addresses Needs Improvement.
2008
9
At a Glance : Results of Technical Network Vulnerability Assessment: EPA's National Health & Environment Effects Research Laboratory, Western Ecology Division.
2011
10
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
2016
11
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
12
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
13
Cybersecurity and cyberwar : what everyone needs to know /
2014
14
Disaster recovery for LANs : a planning and action guide /
1994
15
Federal plan for cyber security and information assurance research and development.
2006
16
Information security : emerging cybersecurity issues threaten federal information systems : report to Congressional requesters.
2005
17
Information technology for counterterrorism : immediate actions and future possibilities /
2003
18
Introduction to network security /
2009
19
LAN disaster prevention and recovery
1994
20
Management Alert : EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information /
2018
21
Nessus network auditing /
2008
22
Network infrastructure security management for dummies /
2014
23
Network security tools
2005
24
Nmap in the enterprise : your guide to network scanning /
2008
25
Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report.
2009
26
Protecting information on local area networks
1988
27
Status of EPA's Implementation of the DATA Act /
2016
28
Steps taken but more work needed to strengthen governance, increase utilization, and improve security planning for the Exchange Network /
2009
29
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
2012
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)