Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Environmental Topics
Laws & Regulations
About EPA
Menu
Environmental Topics
Laws & Regulations
About EPA
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 12
Showing: Items 1 - 12
Your Search: (SUBJECT=Computer security United States)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
Select Item
Title
Year Published
1
At a Glance : EPA Has Taken Steps to Address Cyber Threats but Key Actions Remain Incomplete.
2011
2
At a Glance : EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes.
2017
3
At a Glance : Management of EPA Headquarters Internet Protocol Addresses Needs Improvement.
2008
4
At a Glance : Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability Management Program.
2009
5
At a Glance : Results of Technical Network Vulnerability Assessment: EPA's National Health & Environment Effects Research Laboratory, Western Ecology Division.
2011
6
Cybersecurity and cyberwar : what everyone needs to know /
2014
7
Defending secrets, sharing data : new locks and keys for electronic information.
1987
8
EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes /
2017
9
Guideline for implementing cryptography in the Federal Government
1999
10
Information technology for counterterrorism : immediate actions and future possibilities /
2003
11
Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report.
2009
12
Who goes there? : authentication through the lens of privacy /
2003
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)