Cyber security policy guidebook [[electronic resource] /] / Jennifer L. Bayuk ... [et al.] |
Edizione | [First edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
Disciplina | 005.8 |
Altri autori (Persone) | BayukJennifer L |
Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
ISBN |
1-299-18932-6
1-118-24132-0 1-118-24153-3 1-118-24148-7 |
Classificazione | COM053000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
Record Nr. | UNINA-9910141299203321 |
Hoboken, N.J., : Wiley, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security policy guidebook / / Jennifer L. Bayuk ... [et al.] |
Edizione | [First edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2012 |
Descrizione fisica | 1 online resource (xvi, 270 pages) : illustrations |
Disciplina | 005.8 |
Altri autori (Persone) | BayukJennifer L |
Soggetto topico |
Information technology - Government policy
Computer security - Government policy Data protection - Government policy |
ISBN |
1-299-18932-6
1-118-24132-0 1-118-24153-3 1-118-24148-7 |
Classificazione | COM053000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks
3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 7.2.14 National Strategies |
Record Nr. | UNINA-9910825352603321 |
Hoboken, N.J., : Wiley, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity challenges for state and local governments : assessing how the federal government can help : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, first session, June 25, 2019 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (iii, 50 pages) : color illustration |
Soggetto topico |
Computer security - United States - States
Computer security - Government policy - United States Hacking - United States - States - Prevention Computer networks - Security measures - United States - States Computer security - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity challenges for state and local governments |
Record Nr. | UNINA-9910712860803321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparative perspectives / / Gertjan Boulet, Michael Reiterer, and Ramon Pacheco Pardo |
Autore | Boulet Gertjan |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (305 pages) |
Disciplina | 005.8 |
Collana | New Security Challenges Series |
Soggetto topico |
Computer security - Government policy
Computer security |
ISBN | 3-031-08384-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Foreword -- Contents -- Notes on Contributors -- List of Tables -- Introduction -- 1 Areas for Cyber Cooperation Between the European Union and South Korea -- 2 Aim of the Book -- 3 Target Audience -- 4 Focus and Outline -- 5 Outline of the Chapters -- Part I: Rationale for Cybersecurity Cooperation Between the EU and South Korea -- EU Cyber Diplomacy: Value- and Interest-Driven Foreign Policy with New Focus on the Indo-Pacific -- 1 Introduction -- 2 Cybersecurity and Foreign Policy: Cyber Diplomacy -- 2.1 Cyber Diplomacy Toolbox -- 2.2 Fighting Disinformation -- 3 The Security-Technology Nexus -- 4 Asia and the Indo-Pacific in the Limelight -- 5 Cyber Issues and the Liberal International Order -- 6 Conclusions: Upgrading Cyber Diplomacy -- References -- EU-South Korea Cooperation on Cybersecurity, Data Protection and Emerging Technologies -- 1 Introduction -- 2 The EU's and South Korea's Approaches to Cybersecurity, Data Protection and Emerging Technologies -- 2.1 The European Union -- 2.1.1 Cybersecurity -- 2.1.2 Data Protection -- 2.1.3 Emerging Technologies -- 2.2 South Korea -- 2.2.1 Cybersecurity -- 2.2.2 Data Protection -- 2.2.3 Emerging Technologies -- 3 Shared Threats, Common Concerns and Cooperation -- 3.1 Cybersecurity -- 3.2 Data Protection and Privacy -- 3.3 Emerging Technologies -- 4 Conclusions -- References -- Cyber Offence Dominance, Regional Dynamics, and Middle Power-led International Cooperation -- 1 Introduction -- 2 Cyber Threat Overview -- 3 The Cyber Offence-Defence Balance -- 4 Chainganging and Cyber Conflict Risk in East Asia -- 5 Policy Recommendations -- 5.1 Bucket 1 -- 5.2 Bucket 2 -- 5.3 Bucket 3 -- References -- Developing a Collective Retorsion Framework Against Malicious Cyber Operations: Opportunities and Steps for EU-South Korea Cybersecurity Cooperation -- 1 Introduction.
2 South Korea's Challenges in Response to Malicious Cyber Operations -- 2.1 Attribution Challenges -- 2.2 High Costs of Unilateral Countermeasures by South Korea -- 3 The EU Cyber Diplomacy Toolbox: Restrictive Measures -- 3.1 The EU Cyber Diplomacy Toolbox -- 3.2 Restrictive Measures Under the EU Cyber Diplomacy Toolbox -- 4 EU-South Korea Cooperation for Developing a Collective Retorsion Framework -- 4.1 Lessons from the EU's Restrictive Measures for South Korea: Collective Retorsions -- 4.2 Opportunities for and Steps Towards EU-South Korea Cooperation for a Collective Retorsion Framework -- 5 Conclusion -- References -- Part II: Comparisons -- Cyber Arms Control on the Korean Peninsula: Challenges and Opportunities with a View to North Korea's Asymmetry Strategy -- 1 Introduction -- 2 The Inner-Korean Conflict and the Role of Cyber-Enabled Strategies -- 2.1 Historical Context of North Korea's Asymmetry Strategy and the Role of Cyber Capabilities -- 2.2 North Korea's Cybercrime and Cyberterror Against South Korea in Peacetime -- 2.3 North Korea's Cyber Strategy During Open Military Conflict -- 3 Towards an Inter-Korean Cyber Arms Control Agreement -- 4 Conclusions -- References -- Arms Control in the Cyber Domain: A European Approach to Mitigate Digital Threats -- 1 Introduction -- 2 Contextualising Cyber Threats -- 3 European Cybersecurity as Arms Control Mechanisms -- 3.1 A European Cyber Arms Control Strategic Framework and Operational Implementation -- 3.2 Imposing Restrictive Measures as a Cyber Arms Control Mechanism -- 4 Conclusion and Future Outlook into the Field of Artificial Intelligence -- References -- South Korea's Cyber Defence and Digital Cooperation with the EU -- 1 Introduction -- 2 Evolving North Korea's Cyber Threats -- 2.1 From a Threatening Weapon to an All-Purpose Sword. 2.2 A Role of the Reconnaissance General Bureau (RGB) -- 2.3 North Korea's Cyber Footprints -- 3 Cyber Cooperation Between South Korea and the EU -- 3.1 South Korea's Cyber Strategy -- 3.2 South Korea-EU's Strategic Partnership in the Cyber Sector -- 4 Conclusion: Policy Recommendations -- References -- Building Cyber Resilience: The Defensive Shield for the EU -- 1 Introduction -- 2 Bolstering Cyber Resilience -- 2.1 Resilience and Technological Sovereignty -- 2.2 Operational Capacity to Prevent, Deter, and Respond -- 2.3 Cyber Defence and Disruptive Technologies -- 3 Global Resilience Through Cooperation -- 4 Conclusion -- References -- Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime -- 1 Introduction -- 2 South Korea's International Cooperation Framework on Cybercrime -- 2.1 The Change of South Korea's Cybercrime Investigation Authority from the Prosecutor's Office to the KNPA -- 2.2 Progress to Join the Convention on Cybercrime -- 2.3 Supporting Capacity Building in Global Cybercrime Investigations -- 2.4 International Cooperation with Major Powers Including the US and the EU -- 3 Measures to Enhance International Cybercrime Cooperation: Focus on the EU -- 3.1 Swiftly Joining the Convention on Cybercrime -- 3.2 Establishing a Working Group on Joint Investigation in Cybercrime Between the EU and South Korea -- 3.3 Delivering Cybercrime Capacity Building Projects in Developing Countries -- 3.4 Expanding Cooperation on Digital Forensic Technology -- 3.5 Signing an Executive Agreement of the CLOUD Act -- 4 Conclusion -- References -- The EU and Access to Electronic Evidence: Privatisation of Law Enforcement? -- 1 Introduction -- 2 The EU Approach to E-evidence: Mechanisms and Challenges -- 3 US CLOUD Act -- 4 EU E-Evidence Proposals -- 5 Second Additional Protocol to the Budapest Convention -- 6 Conclusion. References -- Part III: International Order and Cross-Cutting Issues -- Recent Trends in UN Cybersecurity Governance and South Korea-EU Cooperation -- 1 Introduction -- 2 Discussions on Cybersecurity Norms and Laws -- 3 Future Format of Cybersecurity Governance -- 4 South Korea-EU Cooperation in the Context of Cyber Diplomacy -- 4.1 South Korea's International Cooperation -- 4.2 EU-South Korea Strategic Partnership and Shared Interests in Cyber Resilience -- 4.3 South Korea's Cyber Policy Cooperation with the EU -- 5 Conclusion -- References -- The International Cybersecurity Cooperation Dilemma and Implications for EU-South Korea Relations -- 1 Introduction -- 2 Models of International Cybersecurity Cooperation -- 3 Problems in International Cybersecurity Cooperation -- 3.1 Mechanism Fragmentation -- 3.2 Poor Effectiveness -- 3.2.1 Substantive Content/Whether It Serves and Promotes Cooperation -- 3.2.2 Regulatory Constraints/Whether It Regulates and Restricts -- 3.2.3 Accountability/Whether It Punishes Non-cooperative Behavior -- 3.3 Confrontation Between Camps -- 4 Reasons for International Cybersecurity Cooperation Dilemma -- 4.1 Realist Perspective -- 4.1.1 Different Interests to Cooperate Caused by Gaps in National Power -- 4.1.2 The Game of Cost Allocation and Benefit Distribution -- 4.1.3 Technical Uncertainties -- 4.2 Constructivist Perspective -- 4.2.1 Perceptions Caused by Stereotype Thinking -- 4.2.2 Features of Cyberspace Magnifying Perceptions -- 5 A Primer on the Predicament of International Cybersecurity Cooperation in EU-South Korea Relations -- 6 Conclusion -- References -- Conclusion: From Words to Deeds -- 1 Key Rationales for Cybersecurity Cooperation Between the EU and South Korea -- 2 Cybersecurity Policy Development in the EU and South Korea -- 3 Towards EU-South Korea Cybersecurity Cooperation Through Action. 4 The EU, South Korea, and Multilateral Cybersecurity Cooperation -- Index. |
Record Nr. | UNINA-9910634030803321 |
Boulet Gertjan | ||
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DHS's progress in securing election systems and other critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 11, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
Descrizione fisica | 1 online resource (iii, 91 pages) |
Soggetto topico |
Elections - Corrupt practices - United States - Prevention
Hacking - United States - Prevention Cyberinfrastructure - Security measures - United States Computer security - Government policy - United States National security - United States Computer security - Government policy National security |
Soggetto genere / forma |
Online resources.
Legislative hearings. Rules. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | DHS's progress in securing election systems and other critical infrastructure |
Record Nr. | UNINA-9910711814303321 |
Washington : , : U.S. Government Publishing Office, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital risk governance : security strategies for the public and private sectors / / Walter Amedzro St-Hilaire |
Autore | Amedzro St-Hilaire Walter |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVIII, 218 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Government policy
Computer security - Law and legislation |
ISBN | 3-030-61386-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: The international context of corporate digital security -- Chapter 2: National frameworks for the implementation of digital security -- Chapter 3: The complexity of digital technology makes it difficult for enterprises to conceive of its security -- Chapter 4: Intense inter-state competition in cyberspace -- Chapter 5: Establishing competition in digital markets -- Chapter 6: Preserve the legal order by strengthening data control and the ability to regulate platforms -- Chapter 7: Responding to the fiscal challenge launched by the major digital enterprises: a digital security and equity issue -- Chapter 8: Strengths and weaknesses of the enterprise's information system -- Chapter 9: Securing the information system of enterprises and institutions -- Chapter 10: Digital vulnerabilities and attacks compromising the security of enterprises and institutions -- Chapter 11: The nature of the attacks and the characteristics of a cyber-attitude -- Chapter 12: IT safety education for Digital Literacy -- Chapter 13: How to win the digital security challenge in terms of governance -- Chapter 14: Governance through the development of key technologies and the loss of strategic assets -- Chapter 15: Optimize the levers of industrial policy to mobilize financial and human capital: Chapter 16: Conclusion -- Glossary -- References. |
Record Nr. | UNINA-9910468227603321 |
Amedzro St-Hilaire Walter | ||
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Election security : hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (iii, 83 pages) |
Soggetto topico |
Voting-machines - Computer networks - Security measures - United States
Electronic voting - Computer networks - Security measures - United States Ballot - United States Computer security - Government policy - United States Elections - Corrupt practices - United States - Prevention Ballot Computer security - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Election security |
Record Nr. | UNINA-9910712813903321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Federal cybersecurity research and development strategic plan / / prepared by the Cyber Security and Information Assurance Interagency Working Group, Subcommittee on Networking & Information Technology Research & Development, Committee on Science & Technology Enterprise of the National Science & Technology Council |
Pubbl/distr/stampa | [Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]- |
Descrizione fisica | 1 online resource (volumes) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Government policy - United States
Research and development projects - United States - Planning Administrative agencies - Computer networks - Security measures - United States - Planning Technology and state - United States Computer security - Government policy Technology and state |
Soggetto genere / forma | Periodicals. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | .. federal cybersecurity research and development strategic plan |
Record Nr. | UNINA-9910708686803321 |
[Washington, D.C.] : , : Executive Office of the President of the United States, National Science and Technology Council, , [2019?]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Federal cybersecurity research and development strategic plan / / National Science and Technology Council, Networking and Information Technology Research and Development Program |
Pubbl/distr/stampa | Washington, D.C. : , : Executive Office of the President, , 2016 |
Descrizione fisica | 1 online resource (iv, 48 pages) |
Soggetto topico |
Computer security - Government policy - United States
Computer networks - Security measures - United States Computer networks - Security measures Computer security - Government policy |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2016 federal cybersecurity research and development strategic plan |
Record Nr. | UNINA-9910704394803321 |
Washington, D.C. : , : Executive Office of the President, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Federal IT modernization : how the coronavirus exposed outdated systems : hearing before the Subcommittee on Government Operations of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, second session, July 20, 2020 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (iii, 38 pages) |
Soggetto topico |
Information technology - Government policy - United States
Computer security - Government policy - United States Federal government - United States - Information services Government information - Technological innovations - United States Electronic government information - United States COVID-19 (Disease) - United States Computer security - Government policy COVID-19 (Disease) Electronic government information Federal government - Information services Government information - Technological innovations Information technology - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Federal IT modernization |
Record Nr. | UNINA-9910715178203321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|