Search Results for the EPA National Library Catalog

Items Found: 25

Showing: Items 1 - 25

Your Search: (SUBJECT=Data protection.)


Select Item Title Year Published
Agency catalog of data policies and standards. 1991
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network. 2011
Business continuity planning for data centers and systems : a strategic implementation guide / 2008
Defending secrets, sharing data : new locks and keys for electronic information. 1987
Ensuring the integrity, accessibility, and stewardship of research data in the digital age / 2009
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
Federal government information technology : electronic record systems and individual privacy. 1986
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters / 2005
Information security law : control of digital assets / 2006
Information security manual / 1989
Information security series : security practices : comprehensive environmental response, compensation, and liability information system. 2006
Information security series : security practices : integrated compliance information system. 2006
Information technology : security techniques : code of practice for information security management = Technologies de l'information : techniques de scurité : code de pratique pour la gestion de scurité d'information. 2005
Oracle 8i backup & recovery handbook 2001
Pesticides Formulation: Relation to Safety in Use. 1953
Privacy in the information age / 1997
Privacy law sourcebook 2002 : United States law, international law, and recent developments / 2002
Privacy protection/policies for e-information systems. 1999
Protecting your library's digital sources : the essential guide to planning and preservation / 2004
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems / 1993
Techniques and applications of digital watermarking and content protection / 2003
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / 2012
The security risk assessment handbook : a complete guide for performing security risk assessments / 2010
The use of chip implants for workers : study. 2018

Save, Print or Email Selected Records