LEADER 02129nam 2200493 450 001 9910155227603321 005 20130717082120.0 010 $a1-61942-816-4 035 $a(CKB)3710000000973830 035 $a(MiAaPQ)EBC4787157 035 $a(EXLCZ)993710000000973830 100 $a20170130h20122012 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aFederal information security $eselect protection and control efforts /$fDavid G. Miller and Ivan I. Wilson, editors 210 1$aNew York, [New York] :$cNova,$d2012. 210 4$dİ2012 215 $a1 online resource (157 pages) $cillustrations, tables 225 1 $aDefense, Security and Strategies 300 $aIncludes index. 311 $a1-61942-771-0 327 $aInformation Security : Federal Agencies have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk -- Information Security: Federal Deposit Insurance Corporation Needs to Mitigate Control Weaknesses -- Information Security : National Nuclear Security Administration Needs to Improve Contingency Planning for Its Classified Supercomputing Operations -- Information Security : Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies. 410 0$aDefense, security and strategy series. 606 $aWireless communication systems$xSecurity measures$zUnited States 606 $aComputer security$xGovernment policy$zUnited States 606 $aInformation networks$xSecurity measures$zUnited States 606 $aData protection$zUnited States 615 0$aWireless communication systems$xSecurity measures 615 0$aComputer security$xGovernment policy 615 0$aInformation networks$xSecurity measures 615 0$aData protection 676 $a005.80973 702 $aMiller$b David G. 702 $aWilson$b Ivan I. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910155227603321 996 $aFederal information security$92884907 997 $aUNINA