Search Results for the EPA National Library Catalog

Items Found: 43

Showing: Items 1 - 43

Your Search: (SUBJECT=Computer security.)


Select Item Title Year Published
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future / 1990
Absolute beginner's guide to personal firewalls / 2002
Agency catalog of data policies and standards. 1991
An introduction to cyber modeling and simulation / 2019
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network. 2011
Biometrics for dummies / 2008
Clean Air Act confidential business information security manual. 2002
Clean Air Act confidential business information security manual. 2003
Complex Effluent Toxicity Information System (CETIS) (for Microcomputers). 1992
Computer forensics for dummies / 2008
Computer security : governmentwide planning process had limited impact : report to the chairman, Committee on Science, Space, and Technology, House of Representatives / 1990
Computer security agencies reported having implemented most system security controls : report to Congressional requesters / 1992
Computer virus attack : defending against viruses and hackers / 2001
Defending secrets, sharing data : new locks and keys for electronic information. 1987
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
Executive guide : information security management : learning from leading organizations : exposure draft / 1997
Guide for developing security plans for information technology systems 1998
Guideline for implementing cryptography in the Federal Government 1999
Incident response : computer forensics toolkit / 2003
Information security : emerging cybersecurity issues threaten federal information systems : report to Congressional requesters. 2005
Information security : fundamental weaknesses place EPA data and operations at risk / 1999
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters / 2005
Information security computer attacks at Department of Defense pose increasing risks : report to Congressional requesters / 1996
Information security manual / 1989
Information security series : security practices : comprehensive environmental response, compensation, and liability information system. 2006
Information security series : security practices : integrated compliance information system. 2006
Information technology : security techniques : code of practice for information security management = Technologies de l'information : techniques de scurité : code de pratique pour la gestion de scurité d'information. 2005
Information technology for counterterrorism : immediate actions and future possibilities / 2003
Introduction to network security / 2009
Maximum Linux security : {a hacker's guide to protecting your Linux server and workstation} / 2001
Network security tools 2005
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation / 2014
Privacy protection/policies for e-information systems. 1999
Protecting your library's digital sources : the essential guide to planning and preservation / 2004
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems / 1993
Schneier on security / 2008
Secret software : making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more / 2000
Techniques and applications of digital watermarking and content protection / 2003
The security risk assessment handbook : a complete guide for performing security risk assessments / 2010
The Smart Grid and cybersecurity : regulatory policy and issues / 2011
TSCA Confidential Business Information Security Manual. 1993
Who goes there? : authentication through the lens of privacy / 2003

Save, Print or Email Selected Records