Search Results for the EPA National Library Catalog

Items Found: 22
Showing: Items 1 - 22
Your Search: (SUBJECT=Computer networks Security measures)


 
 
 
Select Item Title Year Published
Apache cookbook / 2008
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas. 2016
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : Management Alert: EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information. 2018
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas / 2016
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Disaster recovery for LANs : a planning and action guide / 1994
Federal plan for cyber security and information assurance research and development. 2006
Information security : emerging cybersecurity issues threaten federal information systems : report to Congressional requesters. 2005
Information technology for counterterrorism : immediate actions and future possibilities / 2003
Introduction to network security / 2009
LAN disaster prevention and recovery 1994
Management Alert : EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information / 2018
Nessus network auditing / 2008
Network infrastructure security management for dummies / 2014
Network security tools 2005
Nmap in the enterprise : your guide to network scanning / 2008
Protecting information on local area networks 1988
Status of EPA's Implementation of the DATA Act / 2016
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / 2012

Save, Print or Email Selected Records