Toggle navigation
Hours
Libraries & Collections
Joyner Library
Laupus Health Sciences Library
Music Library
Digital Collections
Special Collections
Teaching Resources
The ScholarShip Institutional Repository
Country Doctor Museum
Get Help
Toggle navigation
ECU Libraries Catalog
Browse
Call Number
Title
Author
Subject
Series
Course Reserves
More
Search History
New Items
Suggest a Purchase
My Account
Search in
All Fields
Title
Author
Journal Title
Subject
Series
ISBN/ISSN
Publisher
search for
Search
Advanced Search
ECU Libraries Catalog
Toggle facets
Find materials by
Location
Joyner Library
653
Laupus Library
23
Music Library
20
Format
Book
651
Electronic
460
Print
141
Microform
57
Journal
7
Software
1
Video (Blu-ray)
1
Publication Date
Publication Date range begin
–
Publication Date range end
Current results range from
1977
to
2024
View distribution
Unknown
3
Call Number
Q - Science
5
J - Political Science
3
K - Law
2
U - Military Science
2
H - Social Science
1
L - Education
1
P - Language and Literature
1
T - Technology
1
Collection
Joyner E-Resources
455
Joyner Federal Documents
182
Laupus E-Resources
23
Joyner Stacks
15
Joyner DVD
1
Language
English
651
Spanish
3
French
1
Genre
Legislative hearings
123
Electronic books
23
Rules and practice
21
Congresses
11
Handbooks, manuals, etc
6
Periodicals
6
Legislative materials
5
Encyclopedias
4
Rules
3
Technical reports
3
more
Genre
»
Era
2016
1
2017-2021
1
2020
1
Region
United States
653
China
7
Russia (Federation)
4
Baltic States
1
California
1
Congresses
1
Israel
1
Korea (North)
1
Latin America
1
Maryland
1
more
Region
»
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request
Search Constraints
Clear Search
You searched for:
Subject
"Computer security United States."
Remove constraint Subject: "Computer security United States."
« Previous
|
641
-
650
of
653
|
Next »
Sort by Relevance
Relevance
Year DESC
Year ASC
Author
Title
Number of results to display per page
10 per page
10
per page
20
per page
50
per page
100
per page
Search Results
The National Counterintelligence and Security Center
by
United States. Office of the National Counterintelligence Executive
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Computer Matching and Privacy Protection Amendments of 1990 : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, second session, on H.R. 5450 ... September 11, 1990
by
United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee
1991
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
Y 4.G 74/7:C 73/32
Private sector perspectives on Department of Defense information technology and cybersecurity activities : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held February 25, 2010
by
United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities
2010
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Computer Matching and Privacy Protection Act of 1986 : hearing before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-ninth Congress, second session, on S. 2756 ... September 16, 1986
by
United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management
1986
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
Y 4.G 74/9:S.HRG.99-915
Protecting maritime facilities in the 21st century : are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
by
United States. Congress. House. Committee on Homeland Security. Subcommittee on Border and Maritime Security
2016
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Harnessing small business innovation for national security cyber needs : hearing before the Subcommittee on Terrorism, Unconventional Threats, and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held July 28, 2010
by
United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities
2010
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
by
Poindexter, Dennis F., 1945-
2013
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
U163 .P587 2013
Computer Security Research and Training Act of 1985 : hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985
by
United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee
1986
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
Y 4.G 74/7:C 73/26/985
CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, 2018
by
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity and Infrastructure Protection
2018
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Cybersecurity workforce: agencies need to improve baseline assessments and procedures for coding positions : report to congressional committees
by
United States. Government Accountability Office
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
« Previous
Next »
1
2
…
61
62
63
64
65
66
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request