Guide to application whitelisting / / Adam Sedgewick, Murugiah Souppaya, Karen Scarfone
| Guide to application whitelisting / / Adam Sedgewick, Murugiah Souppaya, Karen Scarfone |
| Autore | Sedgewick A (Adam) |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Department of Commerce, National Institute of Standards and Technology, , 2015 |
| Descrizione fisica | 1 online resource (17 pages) |
| Collana | NIST special publication ;Computer security |
| Soggetto topico |
Computers - Access control - Standards - United States
Computers - Access control - Government policy - United States Application software - Standards - United States Application software - Government policy - United States Information technology - Security measures - Standards - United States Information technology - Security measures - Government policy - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910704195703321 |
Sedgewick A (Adam)
|
||
| Gaithersburg, MD : , : U.S. Department of Commerce, National Institute of Standards and Technology, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
US policy response to cyber attack on SCADA systems supporting critical national infrastructure / / Scott A. Weed
| US policy response to cyber attack on SCADA systems supporting critical national infrastructure / / Scott A. Weed |
| Autore | Weed Scott A. <1979-> |
| Pubbl/distr/stampa | Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2017] |
| Descrizione fisica | 1 online resource (xi, 52 pages) : illustrations |
| Collana |
Air Force Research Institute perspectives on cyber power
Air Force Research Institute papers |
| Soggetto topico |
Computers - Access control - Government policy - United States
Supervisory control systems - Security measures - United States Cyberterrorism - Prevention Computer security - Government policy - United States Computer security - International cooperation Cyberinfrastructure - Security measures - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
U.S. policy response to cyber attack on SCADA systems supporting critical national infrastructure
United States policy response to cyber attack on SCADA systems supporting critical national infrastructure |
| Record Nr. | UNINA-9910708220203321 |
Weed Scott A. <1979->
|
||
| Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
USGS IT security vulnerabilities
| USGS IT security vulnerabilities |
| Pubbl/distr/stampa | Washington, DC : , : Office of Inspector General, U.S. Department of the Interior, , [2018] |
| Descrizione fisica | 1 online resource (2 pages) |
| Collana | Report |
| Soggetto topico |
Computers - Access control - Government policy - United States
Malware (Computer software) - United States Internet pornography - Government policy - United States Computers - Access control - Government policy Information technology - Security measures Malware (Computer software) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | United States Geological Survey IT security vulnerabilities |
| Record Nr. | UNINA-9910711570503321 |
| Washington, DC : , : Office of Inspector General, U.S. Department of the Interior, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||