Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 53
Showing: Items 1 - 50
Your Search: (SUBJECT=Computer security)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NEIC Library/Denver,CO
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 7 IRC Library/Kansas City,KS
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
ebooks(CRC)
ebooks(Ebrary)
ebooks(Springer)
1
2
NEXT
Select Item
Title
Year Published
1
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future /
1990
2
Absolute beginner's guide to personal firewalls /
2002
3
Agency catalog of data policies and standards.
1991
4
An introduction to cyber modeling and simulation /
2019
5
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
2016
6
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
7
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
8
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
9
At a Glance : EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes.
2017
10
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
2011
11
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
2018
12
Biometrics for dummies /
2008
13
Clean Air Act confidential business information security manual.
2002
14
Clean Air Act confidential business information security manual.
2003
15
Complex Effluent Toxicity Information System (CETIS) (for Microcomputers).
1992
16
Computer forensics for dummies /
2008
17
Computer virus attack : defending against viruses and hackers /
2001
18
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
2016
19
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
20
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
21
Defending secrets, sharing data : new locks and keys for electronic information.
1987
22
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
23
EPA's Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes /
2017
24
Executive guide : information security management : learning from leading organizations : exposure draft /
1997
25
Guide for developing security plans for information technology systems
1998
26
Guideline for implementing cryptography in the Federal Government
1999
27
Incident response : computer forensics toolkit /
2003
28
Information security : emerging cybersecurity issues threaten federal information systems : report to Congressional requesters.
2005
29
Information security : fundamental weaknesses place EPA data and operations at risk /
1999
30
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
2005
31
Information security computer attacks at Department of Defense pose increasing risks : report to Congressional requesters /
1996
32
Information security manual /
1989
33
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
2006
34
Information security series : security practices : integrated compliance information system.
2006
35
Information technology : security techniques : code of practice for information security management = Technologies de l'information : techniques de scurité : code de pratique pour la gestion de scurité d'information.
2005
36
Information technology for counterterrorism : immediate actions and future possibilities /
2003
37
Introduction to network security /
2009
38
Maximum Linux security : {a hacker's guide to protecting your Linux server and workstation} /
2001
39
Network security tools
2005
40
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation /
2014
41
Privacy protection/policies for e-information systems.
1999
42
Protecting your library's digital sources : the essential guide to planning and preservation /
2004
43
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems /
1993
44
Schneier on security /
2008
45
Secret software : making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more /
2000
46
Status of EPA's Implementation of the DATA Act /
2016
47
Techniques and applications of digital watermarking and content protection /
2003
48
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
2011
49
The security risk assessment handbook : a complete guide for performing security risk assessments /
2010
50
The Smart Grid and cybersecurity : regulatory policy and issues /
2011
1
2
NEXT
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)
Main menu
Environmental Topics
Laws & Regulations
About EPA