top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 1-299-18932-6
1-118-24132-0
1-118-24153-3
1-118-24148-7
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910141299203321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.]
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.]
Edizione [First edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2012
Descrizione fisica 1 online resource (xvi, 270 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) BayukJennifer L
Soggetto topico Information technology - Government policy
Computer security - Government policy
Data protection - Government policy
ISBN 1-299-18932-6
1-118-24132-0
1-118-24153-3
1-118-24148-7
Classificazione COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues
6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems
7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes
7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives
7.2.14 National Strategies
Record Nr. UNINA-9910825352603321
Hoboken, N.J., : Wiley, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 50 pages) : color illustration
Soggetto topico Computer security - United States - States
Computer security - Government policy - United States
Hacking - United States - States - Prevention
Computer networks - Security measures - United States - States
Computer security - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity challenges for state and local governments
Record Nr. UNINA-9910712860803321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives / / Gertjan Boulet, Michael Reiterer, and Ramon Pacheco Pardo
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives / / Gertjan Boulet, Michael Reiterer, and Ramon Pacheco Pardo
Autore Boulet Gertjan
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (305 pages)
Disciplina 005.8
Collana New Security Challenges Series
Soggetto topico Computer security - Government policy
Computer security
ISBN 3-031-08384-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Foreword -- Contents -- Notes on Contributors -- List of Tables -- Introduction -- 1 Areas for Cyber Cooperation Between the European Union and South Korea -- 2 Aim of the Book -- 3 Target Audience -- 4 Focus and Outline -- 5 Outline of the Chapters -- Part I: Rationale for Cybersecurity Cooperation Between the EU and South Korea -- EU Cyber Diplomacy: Value- and Interest-Driven Foreign Policy with New Focus on the Indo-Pacific -- 1 Introduction -- 2 Cybersecurity and Foreign Policy: Cyber Diplomacy -- 2.1 Cyber Diplomacy Toolbox -- 2.2 Fighting Disinformation -- 3 The Security-Technology Nexus -- 4 Asia and the Indo-Pacific in the Limelight -- 5 Cyber Issues and the Liberal International Order -- 6 Conclusions: Upgrading Cyber Diplomacy -- References -- EU-South Korea Cooperation on Cybersecurity, Data Protection and Emerging Technologies -- 1 Introduction -- 2 The EU's and South Korea's Approaches to Cybersecurity, Data Protection and Emerging Technologies -- 2.1 The European Union -- 2.1.1 Cybersecurity -- 2.1.2 Data Protection -- 2.1.3 Emerging Technologies -- 2.2 South Korea -- 2.2.1 Cybersecurity -- 2.2.2 Data Protection -- 2.2.3 Emerging Technologies -- 3 Shared Threats, Common Concerns and Cooperation -- 3.1 Cybersecurity -- 3.2 Data Protection and Privacy -- 3.3 Emerging Technologies -- 4 Conclusions -- References -- Cyber Offence Dominance, Regional Dynamics, and Middle Power-led International Cooperation -- 1 Introduction -- 2 Cyber Threat Overview -- 3 The Cyber Offence-Defence Balance -- 4 Chainganging and Cyber Conflict Risk in East Asia -- 5 Policy Recommendations -- 5.1 Bucket 1 -- 5.2 Bucket 2 -- 5.3 Bucket 3 -- References -- Developing a Collective Retorsion Framework Against Malicious Cyber Operations: Opportunities and Steps for EU-South Korea Cybersecurity Cooperation -- 1 Introduction.
2 South Korea's Challenges in Response to Malicious Cyber Operations -- 2.1 Attribution Challenges -- 2.2 High Costs of Unilateral Countermeasures by South Korea -- 3 The EU Cyber Diplomacy Toolbox: Restrictive Measures -- 3.1 The EU Cyber Diplomacy Toolbox -- 3.2 Restrictive Measures Under the EU Cyber Diplomacy Toolbox -- 4 EU-South Korea Cooperation for Developing a Collective Retorsion Framework -- 4.1 Lessons from the EU's Restrictive Measures for South Korea: Collective Retorsions -- 4.2 Opportunities for and Steps Towards EU-South Korea Cooperation for a Collective Retorsion Framework -- 5 Conclusion -- References -- Part II: Comparisons -- Cyber Arms Control on the Korean Peninsula: Challenges and Opportunities with a View to North Korea's Asymmetry Strategy -- 1 Introduction -- 2 The Inner-Korean Conflict and the Role of Cyber-Enabled Strategies -- 2.1 Historical Context of North Korea's Asymmetry Strategy and the Role of Cyber Capabilities -- 2.2 North Korea's Cybercrime and Cyberterror Against South Korea in Peacetime -- 2.3 North Korea's Cyber Strategy During Open Military Conflict -- 3 Towards an Inter-Korean Cyber Arms Control Agreement -- 4 Conclusions -- References -- Arms Control in the Cyber Domain: A European Approach to Mitigate Digital Threats -- 1 Introduction -- 2 Contextualising Cyber Threats -- 3 European Cybersecurity as Arms Control Mechanisms -- 3.1 A European Cyber Arms Control Strategic Framework and Operational Implementation -- 3.2 Imposing Restrictive Measures as a Cyber Arms Control Mechanism -- 4 Conclusion and Future Outlook into the Field of Artificial Intelligence -- References -- South Korea's Cyber Defence and Digital Cooperation with the EU -- 1 Introduction -- 2 Evolving North Korea's Cyber Threats -- 2.1 From a Threatening Weapon to an All-Purpose Sword.
2.2 A Role of the Reconnaissance General Bureau (RGB) -- 2.3 North Korea's Cyber Footprints -- 3 Cyber Cooperation Between South Korea and the EU -- 3.1 South Korea's Cyber Strategy -- 3.2 South Korea-EU's Strategic Partnership in the Cyber Sector -- 4 Conclusion: Policy Recommendations -- References -- Building Cyber Resilience: The Defensive Shield for the EU -- 1 Introduction -- 2 Bolstering Cyber Resilience -- 2.1 Resilience and Technological Sovereignty -- 2.2 Operational Capacity to Prevent, Deter, and Respond -- 2.3 Cyber Defence and Disruptive Technologies -- 3 Global Resilience Through Cooperation -- 4 Conclusion -- References -- Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime -- 1 Introduction -- 2 South Korea's International Cooperation Framework on Cybercrime -- 2.1 The Change of South Korea's Cybercrime Investigation Authority from the Prosecutor's Office to the KNPA -- 2.2 Progress to Join the Convention on Cybercrime -- 2.3 Supporting Capacity Building in Global Cybercrime Investigations -- 2.4 International Cooperation with Major Powers Including the US and the EU -- 3 Measures to Enhance International Cybercrime Cooperation: Focus on the EU -- 3.1 Swiftly Joining the Convention on Cybercrime -- 3.2 Establishing a Working Group on Joint Investigation in Cybercrime Between the EU and South Korea -- 3.3 Delivering Cybercrime Capacity Building Projects in Developing Countries -- 3.4 Expanding Cooperation on Digital Forensic Technology -- 3.5 Signing an Executive Agreement of the CLOUD Act -- 4 Conclusion -- References -- The EU and Access to Electronic Evidence: Privatisation of Law Enforcement? -- 1 Introduction -- 2 The EU Approach to E-evidence: Mechanisms and Challenges -- 3 US CLOUD Act -- 4 EU E-Evidence Proposals -- 5 Second Additional Protocol to the Budapest Convention -- 6 Conclusion.
References -- Part III: International Order and Cross-Cutting Issues -- Recent Trends in UN Cybersecurity Governance and South Korea-EU Cooperation -- 1 Introduction -- 2 Discussions on Cybersecurity Norms and Laws -- 3 Future Format of Cybersecurity Governance -- 4 South Korea-EU Cooperation in the Context of Cyber Diplomacy -- 4.1 South Korea's International Cooperation -- 4.2 EU-South Korea Strategic Partnership and Shared Interests in Cyber Resilience -- 4.3 South Korea's Cyber Policy Cooperation with the EU -- 5 Conclusion -- References -- The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations -- 1 Introduction -- 2 Models of International Cybersecurity Cooperation -- 3 Problems in International Cybersecurity Cooperation -- 3.1 Mechanism Fragmentation -- 3.2 Poor Effectiveness -- 3.2.1 Substantive Content/Whether It Serves and Promotes Cooperation -- 3.2.2 Regulatory Constraints/Whether It Regulates and Restricts -- 3.2.3 Accountability/Whether It Punishes Non-cooperative Behavior -- 3.3 Confrontation Between Camps -- 4 Reasons for International Cybersecurity Cooperation Dilemma -- 4.1 Realist Perspective -- 4.1.1 Different Interests to Cooperate Caused by Gaps in National Power -- 4.1.2 The Game of Cost Allocation and Benefit Distribution -- 4.1.3 Technical Uncertainties -- 4.2 Constructivist Perspective -- 4.2.1 Perceptions Caused by Stereotype Thinking -- 4.2.2 Features of Cyberspace Magnifying Perceptions -- 5 A Primer on the Predicament of International Cybersecurity Cooperation in EU-South Korea Relations -- 6 Conclusion -- References -- Conclusion: From Words to Deeds -- 1 Key Rationales for Cybersecurity Cooperation Between the EU and South Korea -- 2 Cybersecurity Policy Development in the EU and South Korea -- 3 Towards EU-South Korea Cybersecurity Cooperation Through Action.
4 The EU, South Korea, and Multilateral Cybersecurity Cooperation -- Index.
Record Nr. UNINA-9910634030803321
Boulet Gertjan  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2019
Descrizione fisica 1 online resource (iii, 91 pages)
Soggetto topico Elections - Corrupt practices - United States - Prevention
Hacking - United States - Prevention
Cyberinfrastructure - Security measures - United States
Computer security - Government policy - United States
National security - United States
Computer security - Government policy
National security
Soggetto genere / forma Online resources.
Legislative hearings.
Rules.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti DHS's progress in securing election systems and other critical infrastructure
Record Nr. UNINA-9910711814303321
Washington : , : U.S. Government Publishing Office, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire
Autore Amedzro St-Hilaire Walter
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVIII, 218 p.)
Disciplina 005.8
Soggetto topico Computer security - Government policy
Computer security - Law and legislation
ISBN 3-030-61386-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: The international context of corporate digital security -- Chapter 2: National frameworks for the implementation of digital security -- Chapter 3: The complexity of digital technology makes it difficult for enterprises to conceive of its security -- Chapter 4: Intense inter-state competition in cyberspace -- Chapter 5: Establishing competition in digital markets -- Chapter 6: Preserve the legal order by strengthening data control and the ability to regulate platforms -- Chapter 7: Responding to the fiscal challenge launched by the major digital enterprises: a digital security and equity issue -- Chapter 8: Strengths and weaknesses of the enterprise's information system -- Chapter 9: Securing the information system of enterprises and institutions -- Chapter 10: Digital vulnerabilities and attacks compromising the security of enterprises and institutions -- Chapter 11: The nature of the attacks and the characteristics of a cyber-attitude -- Chapter 12: IT safety education for Digital Literacy -- Chapter 13: How to win the digital security challenge in terms of governance -- Chapter 14: Governance through the development of key technologies and the loss of strategic assets -- Chapter 15: Optimize the levers of industrial policy to mobilize financial and human capital: Chapter 16: Conclusion -- Glossary -- References.
Record Nr. UNINA-9910468227603321
Amedzro St-Hilaire Walter  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 83 pages)
Soggetto topico Voting-machines - Computer networks - Security measures - United States
Electronic voting - Computer networks - Security measures - United States
Ballot - United States
Computer security - Government policy - United States
Elections - Corrupt practices - United States - Prevention
Ballot
Computer security - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Election security
Record Nr. UNINA-9910712813903321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council
Pubbl/distr/stampa [Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]-
Descrizione fisica 1 online resource (volumes)
Disciplina 005.8
Soggetto topico Computer security - Government policy - United States
Research and development projects - United States - Planning
Administrative agencies - Computer networks - Security measures - United States - Planning
Technology and state - United States
Computer security - Government policy
Technology and state
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti .. federal cybersecurity research and development strategic plan
Record Nr. UNINA-9910708686803321
[Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program
Pubbl/distr/stampa Washington, D.C. : , : Executive Office of the President, , 2016
Descrizione fisica 1 online resource (iv, 48 pages)
Soggetto topico Computer security - Government policy - United States
Computer networks - Security measures - United States
Computer networks - Security measures
Computer security - Government policy
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2016 federal cybersecurity research and development strategic plan
Record Nr. UNINA-9910704394803321
Washington, D.C. : , : Executive Office of the President, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 38 pages)
Soggetto topico Information technology - Government policy - United States
Computer security - Government policy - United States
Federal government - United States - Information services
Government information - Technological innovations - United States
Electronic government information - United States
COVID-19 (Disease) - United States
Computer security - Government policy
COVID-19 (Disease)
Electronic government information
Federal government - Information services
Government information - Technological innovations
Information technology - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Federal IT modernization
Record Nr. UNINA-9910715178203321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui