Security assessment : case studies for implementing the NSA IAM
by Rogers, Russ
DDC/LCC
|
|
2033 |
18 |
2004 |
2004 |
BackTrack 4 : assuring security by penetration testing
by Ali, Shakeel
DDC/LCC
|
|
1475 |
7 |
2011 |
2011 |
Penetration testing : protecting networks and systems
by Henry, Kevin M.
DDC/LCC
|
|
1275 |
8 |
2012 |
2012 |
Cyber security innovation for the digital economy : a case study of the Russian Federation
by Petrenko, Sergei
DDC/LCC
|
|
1040 |
5 |
2018 |
2018 |
Cybercrime : digital cops in a networked environment
by Balkin, J. M.
DDC/LCC
|
|
1013 |
8 |
2007 |
2007 |
The network security test lab : a step-by-step guide
by Gregg, Michael (Michael C.)
DDC/LCC
|
|
980 |
15 |
2015 |
2017 |
Network security evaluation using the NSA IEM
by Rogers, Russ
DDC/LCC
|
|
903 |
10 |
2005 |
2014 |
Cyber insecurity : hackers are penetrating federal systems and critical infrastructure : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, April 19, 2007
by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
|
|
784 |
6 |
2009 |
2009 |
IT security metrics : a practical framework for measuring security & protecting data
by Hayden, Lance
DDC/LCC
|
|
738 |
11 |
2010 |
2010 |
Transportation challenges and cybersecurity post-9/11 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, December 2, 2009
by United States. Congress. Senate. Committee on Commerce, Science, and Transportation
LCC
|
|
737 |
5 |
2010 |
2010 |
Addressing the nation's cybersecurity challenges : reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007
by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
|
|
683 |
8 |
2009 |
2009 |
Assessing the security of critical infrastructure : threats, vulnerabilities, and solutions : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fourteenth Congress, second session, May 18, 2016
by United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs
LCC
|
|
500 |
4 |
2017 |
2017 |
Cyberterrorism: is the nation's critical infrastructure adequately protected? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, July 24, 2002
by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations
LCC
|
|
495 |
7 |
2003 |
2003 |
Improving our ability to fight cybercrime : oversight of the National Infrastructure Protection Center : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, July 25, 2001
by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information
LCC
|
|
490 |
5 |
2002 |
2002 |
Implications of cyber vulnerabilities on the resilience and security of the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008
by United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
LCC
|
|
484 |
6 |
2008 |
2008 |
Cybersecurity : a review of public and private efforts to secure our nation's Internet infrastructure : hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, October 23, 2007
by United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Information Policy, Census, and National Archives
LCC
|
|
469 |
5 |
2008 |
2008 |
Computer security report card : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 11, 2000
by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology
DDC/LCC
|
|
450 |
6 |
2001 |
2001 |
Information security management metrics : a definitive guide to effective security monitoring and measurement
by Brotby, W. Krag
DDC/LCC
|
|
414 |
17 |
2009 |
2009 |
BackTrack 5 cookbook : over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
by Pritchett, Willie
DDC/LCC
|
|
388 |
18 |
2012 |
2013 |
Computer security : progress made, but critical federal operations and assets remain at risk
by Dacey, Robert F.
LCC
|
|
322 |
2 |
2002 |
2002 |
Critical infrastructure protection : Department of Homeland Security faces challenges in fulfilling cybersecurity responsibilities : report to Congressional requesters
by United States. Government Accountability Office
DDC/LCC
|
|
313 |
4 |
2005 |
2005 |
Security monitoring with Cisco security MARS
by Halleen, Gary
DDC/LCC
|
|
313 |
8 |
2007 |
2007 |
Security threat mitigation and response : understanding Cisco security MARS
by Tesch, Dale
DDC/LCC
|
|
306 |
13 |
2006 |
2007 |
Information security : further actions needed to address risks to Bank Secrecy Act data : report to congressional requesters
by United States. Government Accountability Office
LCC
|
|
299 |
3 |
2009 |
2009 |
Information security : federal agency efforts to encrypt sensitive information are under way, but work remains : report to congressional requesters
by United States. Government Accountability Office
LCC
|
|
298 |
4 |
2008 |
2008 |