Commission on Child Online Protection (COPA) report to Congress [[electronic resource]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : The Commission, , [2000] |
Disciplina |
004.67026
351 |
Soggetto topico |
Child pornography - United States
Computer networks - Access control - United States Computers and children Internet and children - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Commission on Child Online Protection |
Record Nr. | UNINA-9910690962303321 |
[Washington, D.C.] : , : The Commission, , [2000] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ECPA . Part I : lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013 |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2013 |
Descrizione fisica | 1 online resource (iii, 75 pages) |
Soggetto topico |
Computer security - United States
Data protection - Law and legislation - United States Computer networks - Access control - United States Cloud computing - Security measures - United States Information technology - Security measures - United States Privacy, Right of - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ECPA |
Record Nr. | UNINA-9910704775003321 |
Washington : , : U.S. Government Printing Office, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic Communications Privacy Act (ECPA) . Part II : geolocation privacy and surveillance : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013 |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2013 |
Descrizione fisica | 1 online resource (iii, 163 pages) : illustration |
Soggetto topico |
Computer security - United States
Data protection - Law and legislation - United States Computer networks - Access control - United States Cloud computing - Security measures - United States Information technology - Security measures - United States Privacy, Right of - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Electronic Communications Privacy Act |
Record Nr. | UNINA-9910704825803321 |
Washington : , : U.S. Government Printing Office, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Final report of the Rendition, Detention, and Interrogation Network agency accountability report |
Pubbl/distr/stampa | [Washington, D.C.] : , : [Central Intelligence Agency], , [2015?] |
Descrizione fisica | 1 online resource (38 pages) |
Soggetto topico | Computer networks - Access control - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910708608803321 |
[Washington, D.C.] : , : [Central Intelligence Agency], , [2015?] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy in the digital age [[electronic resource] ] : encryption and mandatory access : hearing before the Subcommittee on the Constitution, Federalism, and Property Rights of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, second session ... March 17, 1998 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 1998 |
Descrizione fisica | 1 online resource (iv, 121 pages) |
Collana | S. hrg. |
Soggetto topico |
Data encryption (Computer science) - United States
Computer networks - Access control - United States Digital communications - United States Privacy, Right of - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Privacy in the digital age |
Record Nr. | UNINA-9910703333903321 |
Washington : , : U.S. G.P.O., , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy in the digital age : discussion of issues surrounding the internet : hearing before the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session ... April 21, 1999 |
Descrizione fisica | 1 online resource (iii, 234 p.) : ill |
Soggetto topico |
Internet - Law and legislation - United States
Privacy, Right of - United States Data protection - Law and legislation - United States Electronic commerce - Law and legislation - United States Data encryption (Computer science) - United States Computer networks - Access control - United States Digital communications - United States |
Soggetto non controllato |
Internet
Privacy, right of Data protection Electronic commerce Data encryption (computer science) Computer networks Digital communications Law Computers Business & economics Technology & engineering |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Privacy in the digital age |
Record Nr. | UNINA-9910689481703321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the Privilege Management Workshop [[electronic resource] ] : September 1-3, 2009 / / Sheldon A. Durrant, Tanya Brewer, Annie Sokol, editors |
Pubbl/distr/stampa | Gaithersburg, Md. : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2010] |
Descrizione fisica | 1 online resource (6 pages) |
Altri autori (Persone) |
DurrantSheldon A
BrewerTanya SokolAnnie |
Collana | NISTIR |
Soggetto topico |
Computer networks - Access control - United States
Computer security - Standards - United States Data encryption (Computer science) |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Proceedings of the Privilege Management Workshop |
Record Nr. | UNINA-9910699638603321 |
Gaithersburg, Md. : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2010] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Rapid acquisition and fielding for information assurance and cyber security in the Navy |
Autore | Porche Isaac <1968-> |
Pubbl/distr/stampa | [Place of publication not identified], : RAND National Defense Research Institute, 2012 |
Disciplina | 359.6/212 |
Soggetto topico |
Computer networks - Security measures - Planning - United States
Computer networks - Access control - United States Computer security - United States Military & Naval Science Law, Politics & Government Naval Science - General |
ISBN | 0-8330-8348-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Summary -- Approach -- Key findings and recommendations from the analysis xiii -- Acknowledgments -- Abbreviations -- Introduction -- Mitigating the cyber threat through rapid acquisition -- Study approach -- Organization of this report -- Testing (certification and accreditation) challenges, best practices -- And recommendations -- Testing in the new IT acquisition strategy -- Navy modernization process challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Budgeting, funding, and contracts challenges, best practices, and -- Recommendations -- Challenges -- Recommendations -- Governance, integration and training, and emergent needs challenges -- Best practices, and recommendations -- Challenges -- Recommendations -- Summary and conclusions -- Future work -- Appendix A: Survey of RAPID acquisition processes -- Appendix B: Navy RAPID acquisition options -- Appendix C: Case studies of successful RAPID/IT acquisition -- Navy case study: A-RCI -- Army case study: DRRS-A -- Marine Corps case study: Commercial hunter -- Appendix D: JCIDS and incremental acquisition background information -- Exceptions to JCIDS -- Description of "IT box" -- Appendix E: review of cyber and IT acquisition literature -- Legislation -- National research council report -- Defense Science Board report -- Other reports -- Appendix f: Air Force cyber acquisition -- Appendix G: Worms -- Worm attacks are an increasing problem -- Worm attacks require fast and frequent responses. |
Record Nr. | UNINA-9910220093103321 |
Porche Isaac <1968-> | ||
[Place of publication not identified], : RAND National Defense Research Institute, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Report of investigation Agency access to the SSCI shared drive on RDINet |
Pubbl/distr/stampa | [Washington, D.C.] : , : Central Intelligence Agency, Office of Inspector General, , 2014 |
Descrizione fisica | 1 online resource (approximately 57 pages) |
Soggetto topico | Computer networks - Access control - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Agency access to the SSCI shared drive on RDINet |
Record Nr. | UNINA-9910715306603321 |
[Washington, D.C.] : , : Central Intelligence Agency, Office of Inspector General, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|