A Lesson of the Gulf War: National Security Requires Computer Security : Hearing Before the Subcommittee on Government Information and Regulation of the Committee on Governmental Affairs, United States Senate, One Hundred Second Congress, First Session, June 19, 1991, Volume 4
United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Government Information and Regulation
U.S. Government Printing Office, 1992 - Law - 35 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities attacks attention to computer believe Bramlage break-ins Brock CARL LEVIN classified information Committee on Governmental compromise computer crimes computer hackers Computer Security Act computer security training DEBORAH DAVIS Department of Energy Desert Storm DOD computer systems DoD officials DOD sites ensure example gain access Glickman Government computing systems Government Information hacker intrusions hackers exploited hackers had access hackers modified hearing implemented Information and Regulation Internet jojjb kind Lawrence Livermorc National legislation Livermorc National Laboratory LLNL COMPUTER SEC Matthew Broderick military National Security Agency network intrusions network security NIST Once the hackers Operation Desert Operation Desert Storm password cracking password file password management penetrated Poor password protect puter require security failure Senator Kohl sensitive information standards/regulations Subcommittee on Government system administrator privileges system manager systems connected tath testimony Thank things Tymnet U.S. Government computing unclassified user account vendor-supplied account vulnerability well-known security