Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
- Label
- Computer security
- Source
- fast
22 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- 2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
- Computers & security
- Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Department of Defense enterprise-wide cybersecurity policies and architecture : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, January 29, 2019
- Derived personal identity verification (PIV) credentials
- Digitale Souveränität : Bürger, Unternehmen, Staat
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Enhancing Grid Security through Public-Private Partnerships Act : report (to accompany H.R. 359)
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Hack proofing your network
- Managing risk and information security : protect to enable
- Open hearing on the intelligence community's assessment on Russian activities and intentions in the 2016 U.S. elections : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, first session, Tuesday, January 10, 2017
- Securing electronic health records on mobile devices
- Securing the nation's internet architecture : joint hearing before the Subcommittee on Intelligence and Emerging Threats and Capabilities of the Committee on Armed Services meeting jointly with the Subcommittee on National Security of the Committee on Oversight and Reform, House of Representatives, One Hundred Sixteenth Congress, first session : hearing held September 10, 2019
- Situational awareness for electric utilities
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- The Department of Defense and the power of cloud computing : weighing acceptable cost versus acceptable risk
- The art of deception : controlling the human element of security
- The cybersecurity responsibilities of the defense industrial base : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, March 26, 2019
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The status and outlook for cybersecurity efforts in the energy industry : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixteenth Congress, first session, February 14, 2019
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/75BBBBe3lUU/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/75BBBBe3lUU/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/75BBBBe3lUU/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/75BBBBe3lUU/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>