Search Results for the EPA National Library Catalog

Items Found: 34

Showing: Items 1 - 34

Your Search: (SUBJECT=Data protection.)

 
 
 

Select Item Title Year Published
Agency catalog of data policies and standards. 1991
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas. 2016
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network. 2011
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders. 2018
Business continuity planning for data centers and systems : a strategic implementation guide / 2008
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas / 2016
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Defending secrets, sharing data : new locks and keys for electronic information. 1987
Ensuring the integrity, accessibility, and stewardship of research data in the digital age / 2009
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters / 2005
Information security law : control of digital assets / 2006
Information security manual / 1989
Information security series : security practices : comprehensive environmental response, compensation, and liability information system. 2006
Information security series : security practices : integrated compliance information system. 2006
Information technology : security techniques : code of practice for information security management = Technologies de l'information : techniques de scurité : code de pratique pour la gestion de scurité d'information. 2005
Oracle 8i backup & recovery handbook 2001
Pesticides Formulation: Relation to Safety in Use. 1953
Privacy in the information age / 1997
Privacy law sourcebook 2002 : United States law, international law, and recent developments / 2002
Privacy protection/policies for e-information systems. 1999
Protecting your library's digital sources : the essential guide to planning and preservation / 2004
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems / 1993
Safeguard critical documents and valuables. 2018
Status of EPA's Implementation of the DATA Act / 2016
Techniques and applications of digital watermarking and content protection / 2003
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / 2012
The security risk assessment handbook : a complete guide for performing security risk assessments / 2010
The use of chip implants for workers : study. 2018
Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders / 2018

Save, Print or Email Selected Records