Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Environmental Topics
Laws & Regulations
About EPA
Menu
Environmental Topics
Laws & Regulations
About EPA
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 58
Showing: Items 1 - 50
Your Search: (SUBJECT=Computer security)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
1
2
NEXT
Select Item
Title
Year Published
1
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future /
1990
2
Absolute beginner's guide to personal firewalls /
2002
3
Agency catalog of data policies and standards.
1991
4
An introduction to cyber modeling and simulation /
2019
5
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
2016
6
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
7
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
8
At a Glance : EPA Has Taken Steps to Address Cyber Threats but Key Actions Remain Incomplete.
2011
9
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
10
At a Glance : EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes.
2017
11
At a Glance : Management of EPA Headquarters Internet Protocol Addresses Needs Improvement.
2008
12
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
2011
13
At a Glance : Results of Technical Network Vulnerability Assessment: EPA's National Health & Environment Effects Research Laboratory, Western Ecology Division.
2011
14
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
2018
15
Case Study : Ohio Environmental Protection Agency's Electronic Discharge Monitoring Report (eDMR) System Reaches 99% Adoption.
2010
16
Clean Air Act confidential business information security manual.
2003
17
Clean Air Act confidential business information security manual.
2002
18
Complex Effluent Toxicity Information System (CETIS) (for Microcomputers).
1992
19
Computer virus attack : defending against viruses and hackers /
2001
20
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
2016
21
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
22
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
23
Cybersecurity and cyberwar : what everyone needs to know /
2014
24
Defending secrets, sharing data : new locks and keys for electronic information.
1987
25
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
26
EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes /
2017
27
Gray hat hacking : the ethical hacker's handbook /
2022
28
Guideline for implementing cryptography in the Federal Government
1999
29
ICIS Governance Fact Sheet.
2011
30
ICIS-NPDES Batch System Flow Configuration Document : Version 2.1 /
2010
31
Information security : emerging cybersecurity issues threaten federal information systems : report to Congressional requesters.
2005
32
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
2005
33
Information security manual /
1989
34
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
2006
35
Information security series : security practices : integrated compliance information system.
2006
36
Information technology for counterterrorism : immediate actions and future possibilities /
2003
37
Integrated Compliance Information System : ICIS Reports - Schedule Evaluation.
2009
38
Integrated Compliance Information System National Pollutant Discharge Elimination System (ICIS-NPDES) Data Exchange Template For Electronic Reporting of DMRs.
2011
39
Integrated Compliance Information System NPDES : Technical Specification Document Expected Discharge Monitoring Report (DMR) Schedule Version 2.1.
2009
40
Introduction to network security /
2009
41
Maximum Linux security : {a hacker's guide to protecting your Linux server and workstation} /
2001
42
MGT514 : IT security strategic planning, policy, and leadership.
2016
43
Network infrastructure security management for dummies /
2014
44
Network security tools
2005
45
Office of Enforcement and Compliance Assurance Integrated Compliance Information System ICIS Batch DMR - Technical Specification Version 1.1 For Electronic Reporting of DMRs.
2011
46
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation /
2014
47
Protecting your library's digital sources : the essential guide to planning and preservation /
2004
48
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems /
1993
49
Security delivery platforms for dummies /
2016
50
Status of EPA's Implementation of the DATA Act /
2016
1
2
NEXT
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)