Classify

An experimental classification web service

Powered by the Classify Web Service.

Search Results

Search Criteria: FAST heading = Computer security--Evaluation
Displaying 1 to 25 of 143
Title & Author Format Holdings Editions From To
Security assessment : case studies for implementing the NSA IAM by Rogers, Russ
DDC/LCC
  2033 18 2004 2004
BackTrack 4 : assuring security by penetration testing by Ali, Shakeel
DDC/LCC
  1475 7 2011 2011
Penetration testing : protecting networks and systems by Henry, Kevin M.
DDC/LCC
  1275 8 2012 2012
Cyber security innovation for the digital economy : a case study of the Russian Federation by Petrenko, Sergei
DDC/LCC
  1040 5 2018 2018
Cybercrime : digital cops in a networked environment by Balkin, J. M.
DDC/LCC
  1013 8 2007 2007
The network security test lab : a step-by-step guide by Gregg, Michael (Michael C.)
DDC/LCC
  980 15 2015 2017
Network security evaluation using the NSA IEM by Rogers, Russ
DDC/LCC
  903 10 2005 2014
Cyber insecurity : hackers are penetrating federal systems and critical infrastructure : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, April 19, 2007 by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
  784 6 2009 2009
IT security metrics : a practical framework for measuring security & protecting data by Hayden, Lance
DDC/LCC
  738 11 2010 2010
Transportation challenges and cybersecurity post-9/11 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, December 2, 2009 by United States. Congress. Senate. Committee on Commerce, Science, and Transportation
LCC
  737 5 2010 2010
Addressing the nation's cybersecurity challenges : reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007 by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
  683 8 2009 2009
Assessing the security of critical infrastructure : threats, vulnerabilities, and solutions : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fourteenth Congress, second session, May 18, 2016 by United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs
LCC
  500 4 2017 2017
Cyberterrorism: is the nation's critical infrastructure adequately protected? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, July 24, 2002 by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
LCC
  495 7 2003 2003
Improving our ability to fight cybercrime : oversight of the National Infrastructure Protection Center : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, July 25, 2001 by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information
LCC
  490 5 2002 2002
Implications of cyber vulnerabilities on the resilience and security of the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008 by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
  484 6 2008 2008
Cybersecurity : a review of public and private efforts to secure our nation's Internet infrastructure : hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, October 23, 2007 by United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Information Policy, Census, and National Archives
LCC
  469 5 2008 2008
Computer security report card : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 11, 2000 by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology
DDC/LCC
  450 6 2001 2001
Information security management metrics : a definitive guide to effective security monitoring and measurement by Brotby, W. Krag
DDC/LCC
  414 17 2009 2009
BackTrack 5 cookbook : over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 by Pritchett, Willie
DDC/LCC
  388 18 2012 2013
Computer security : progress made, but critical federal operations and assets remain at risk by Dacey, Robert F.
LCC
  322 2 2002 2002
Critical infrastructure protection : Department of Homeland Security faces challenges in fulfilling cybersecurity responsibilities : report to Congressional requesters by United States. Government Accountability Office
DDC/LCC
  313 4 2005 2005
Security monitoring with Cisco security MARS by Halleen, Gary
DDC/LCC
  313 8 2007 2007
Security threat mitigation and response : understanding Cisco security MARS by Tesch, Dale
DDC/LCC
  306 13 2006 2007
Information security : further actions needed to address risks to Bank Secrecy Act data : report to congressional requesters by United States. Government Accountability Office
LCC
  299 3 2009 2009
Information security : federal agency efforts to encrypt sensitive information are under way, but work remains : report to congressional requesters by United States. Government Accountability Office
LCC
  298 4 2008 2008
Displaying 1 to 25 of 143
.