Hidden fields
Books Books
" support, such as telecommunications, power distribution, national defense, and essential government services. Malicious attacks, in particular, are a growing concern. The National Security Agency has determined that foreign governments already have or... "
Improving Our Ability to Fight Cybercrime: Oversight of the National ... - Page 15
by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information - 2002 - 81 pages
Full view - About this book

Year 2000 Computing Challenge: Lessons Learned Can Be Applied to Other ...

Joel C. Willemssen - Computers - 2001 - 74 pages
...types of computer attacks are also a continuing threat. The National Security Agency has determined that potential adversaries are developing a body of knowledge about US systems and about methods to attack them. According to DOD officials, these methods, which include sophisticated...
Full view - About this book

Critical Infrastructure Protection: Significant Challenges in Developing ...

United States. General Accounting Office - Administrative agencies - 2001 - 110 pages
...risks to computer systems and, more importantly, to the critical operations and infrastructures they support, such as telecommunications, power distribution,...incidents have increased dramatically in recent years. As a result, a clear risk exists that terrorists or hostile foreign states could launch computer-based...
Full view - About this book

Critical Infrastructure Protection: Significant Challenges in Developing ...

Robert Dacey - Business & Economics - 2001 - 112 pages
...risks to computer systems and, more importantly, to the critical operations and infrastructures they support, such as telecommunications, power distribution,...incidents have increased dramatically in recent years. As a result, a clear risk exists that terrorists or hostile foreign states could launch computer-based...
Full view - About this book

Combating Terrorism: Selected Challenges and Related Recommendations ...

United States. General Accounting Office - National security - 2001 - 220 pages
...Security Agency, foreign governments already have or are developing computer attack capabilities and potential adversaries are developing a body of knowledge about US systems and methods to attack these systems. However, the sources of and motives behind cyber-attacks often cannot be readily determined....
Full view - About this book

Establishing a Federal CIO: Information Technology Management and Assurance ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - Business & Economics - 2000 - 232 pages
...types of computer attacks are also a continuing threat . The National Security Agency has determined that potential adversaries are developing a body of knowledge about US systems and about methods to attack them. According to DOD officials, these methods, which include sophisticated...
Full view - About this book

Establishing a Federal CIO: Information Technology Management and Assurance ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - Business & Economics - 2000 - 242 pages
...other types of computer (tucks are also a continuing threat The National Security Agency has determined that potential adversaries are developing a body of knowledge about US systems and about methods to attack them. According to DOD officials, these methods, which include sophisticated...
Full view - About this book

Computer Security: Cyber Attacks--war Without Borders : Hearing Before the ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - Computer crimes - 2001 - 206 pages
...communications networks, and other information systems or networks. The National Security Agency has determined that potential adversaries are developing a body of knowledge about US systems and about methods to attack these systems. According to Defense officials, these methods, which include...
Full view - About this book

Computer Security: Cyber Attacks--war Without Borders : Hearing Before the ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - Computer crimes - 2001 - 212 pages
...communications networks, and other information systems or networks. The National Security Agency has determined that potential adversaries are developing a body of knowledge about US systems and about methods to attack these systems. According to Defense officials, these methods, which include...
Full view - About this book

What Can be Done to Reduce the Threats Posed by Computer Viruses and Worms ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 196 pages
...or are developing computer attack capabilities. Further, the National Security Agency has determined that potential adversaries are developing a body of...knowledge about US systems and methods to attack them. Meanwhile, our government and our nation have become increasingly reliant on Interconnected computer...
Full view - About this book

What Can be Done to Reduce the Threats Posed by Computer Viruses and Worms ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations - Administrative agencies - 2002 - 192 pages
...or are developing computer attack capabilities. Further, the National Security Agency has determined that potential adversaries are developing a body of...knowledge about US systems and methods to attack them. Meanwhile, our government and our nation have become increasingly reliant on interconnected computer...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF