Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
- Label
- Computer security
- Authority link
- http://id.worldcat.org/fast/00872484
- Source
- fast
53 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- 21 steps to improve cyber security of SCADA networks
- Commercial perspectives on information assurance research
- Computer security impact of Y2K : expanded risks or fraud? Joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computers & security
- Cyber security : a crisis of prioritization
- Cybersecurity : actions needed to strengthen U.S. capabilities
- Cybersecurity workforce: agencies need to improve baseline assessments and procedures for coding positions : report to congressional committees
- Cybersecurity: DHS needs to enhance efforts to improve and promote the security of federal and private-sector networks : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Designing a holistic prototype and evaluating the requirements of long-term care electronic health record
- Developing a HIPAA compliant EMR system : TigerPlace case study
- Digital signature standard (DSS)
- Digitale Souveränität : Bürger, Unternehmen, Staat
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- Hack proofing ColdFusion
- Hack proofing XML
- Hack proofing your identity in the information age : protect your family on the internet!
- Hack proofing your network
- Harvesting American Cybersecurity Knowledge through Education Act of 2019 : report of the Committee on Commerce, Science, and Transportation on S. 2775
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- Incident response & computer forensics
- Information hiding techniques for steganography and digital watermarking
- Information security : additional actions needed to fully implement reform legislation
- Information security : challenges to improving DOD's incident response capabilities
- Information security best practices : 200 basic rules
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information technology for counterterrorism : immediate actions and future possibilities
- Managing risk and information security : protect to enable
- National Institute of Standards and Technology Reauthorization Act of 2018 : report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- Principles of security and trust : 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Security technologies for the World Wide Web
- Security technologies for the World Wide Web
- Status of the 1990 decennial census
- Stealing the network : how to own the box
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Techniques and applications of digital watermarking and content protection
- Terminal compromise
- The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals
- The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?
- The art of deception : controlling the human element of security
- The complete guide to Internet security
- The international handbook of computer security
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The state of small business security in a cyber economy : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006
- The status and outlook for cybersecurity efforts in the energy industry : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixteenth Congress, first session, February 14, 2019
- Tribal Health Data Improvement Act of 2020 : report (to accompany H.R. 7948)
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2015
- Voice over IP security : a comprehensive survey of vulnerabilities and academic research
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/sYZEa-kaPdo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/sYZEa-kaPdo/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/sYZEa-kaPdo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/sYZEa-kaPdo/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>