. . "Computer security--United States"@en . _:b7iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b7iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b7iddOtlocdOtgovauthoritiessubjectssh2008101478 _:b015 . . . "Computer security"@en . _:b12iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b12iddOtlocdOtgovauthoritiessubjectssh2008101478 _:b13iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b12iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b13iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b13iddOtlocdOtgovauthoritiessubjectssh2008101478 "Computer security"@en . _:b015 _:b16iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b015 . _:b16iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b16iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b16iddOtlocdOtgovauthoritiessubjectssh2008101478 "United States"@en . _:b16iddOtlocdOtgovauthoritiessubjectssh2008101478 _:b20iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b20iddOtlocdOtgovauthoritiessubjectssh2008101478 _:b21iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b20iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b21iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b21iddOtlocdOtgovauthoritiessubjectssh2008101478 "United States"@en . "150 $aComputer security$zUnited States" . . . . . "Bureau of National Affairs (Arlington, Va.) Global privacy and security law" . . . "Common criteria & methodology for information technology security evaluation" . . . "Computer and network security in higher education" . . . "Critical infrastructure protection" . . . "Cyber terrorism and information warfare" . . . "Cyber threats and information security" . . . "Cybersecurity and homeland security" . . . "Cybersecurity today and tomorrow" . . . "Digital rights management" . . . "Garfinkel, Simson Database nation" . . . "Garfinkel, Simson Database nation" . . . "Gorman, S. P. Networks, security, and complexity" . . . "Guttman, Barbara An introduction to computer security" . . . "Information security" . . . "Laudon, Kenneth C., 1944- Dossier society" . . . "Lee, Annabelle Guideline for implementing cryptography in the Federal Government" . . . "Legal issues in information system security" . . . "Legal issues of data security" . . . "Linowes, David F. Privacy in America" . . . "Liu, Peng Trusted recovery and defensive information warfare" . . . "Luna, J. J. How to be invisible" . . . "Mussington, David, 1960- Concepts for enhancing critical infrastructure protection" . . . "National plan for information systems protection" . . . "Nichols, Randall K. Defending your digital assets against hackers, crackers, spies, and thieves" . . . "Nichols, Randall K. Defending your digital assets against hackers, crackers, spies, and thieves" . . . "Rantala, Ramona R. Cybercrime against businesses" . . . "Roddel, Victoria Stay safe in cyberspace" . . . "Roddel, Victoria Stay safe in cyberspace" . . . "Rosen, Jeffrey, 1964- The unwanted gaze" . . . "Rosen, Jeffrey, 1964- The unwanted gaze" . . . "Rubin, Michael Rogers Private rights, public wrongs" . . . "Security in the information age" . . . "Sullivan, Kathleen M. (Kathleen Marie), 1960- Racing toward \"Big Brother\"" . . . "Tax information security guidelines for federal, state, and local agencies" . . . "Technology assessment" . . . "United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Cyber security" . . . "United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Securing consumers' data" . . . "United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. How secure is sensitive Commerce Department data and operations?" . . . "United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. Protecting America's critical infrastructure" . . . "United States. Congress. House. Committee on Financial Services. Assessing data security" . . . "United States. Congress. House. Committee on Financial Services. Subcommittee on Financial Institutions and Consumer Credit. Enhancing data security" . . . "United States. Congress. House. Committee on Financial Services. Subcommittee on Financial Institutions and Consumer Credit. Fighting fraud" . . . "United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee. Computer security at the Drug Enforcement Administration" . . . "United States. Congress. House. Committee on Government Reform. Overexposed" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. Computer security in the federal government" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. Computer security in the Federal Government" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. Lessons learned from the Government Information Security Reform Act of 2000" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. Computer security" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. Computer security" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology. Enhancing computer security" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Cyber security" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Identity theft" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Locking your cyber front door" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Protecting our nation's cyber space" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Telecommunications and SCADA" . . . "United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Worm and virus defense" . . . "United States. Congress. House. Committee on Government Reform. You've got mail, but is it secure?" . . . "United States. Congress. House. Committee on International Relations. Oversight of the State Department" . . . "United States. Congress. House. Committee on International Relations. Subcommittee on International Economic Policy and Trade. Encryption security in a high tech era" . . . "United States. Congress. House. Committee on Science. Computer security lapses" . . . "United States. Congress. House. Committee on Science. Cyber security-how can we protect American computer networks from attack?" . . . "United States. Congress. House. Committee on Science. Cyber terrorism-a view from the Gilmore Commission" . . . "United States. Congress. House. Committee on Science. Homeland security" . . . "United States. Congress. House. Committee on Science. Subcommittee on Technology. Computer security impact of Y2K" . . . "United States. Congress. House. Committee on Science. Subcommittee on Technology. H.R. 2413, the Computer Security Enhancement Act of 1999" . . . "United States. Congress. House. Committee on Science. Subcommittee on Technology. The Melissa virus" . . . "United States. Congress. House. Committee on the Judiciary. Subcommittee on Courts and Intellectual Property. Privacy and electronic communications" . . . "United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security. Implementation of the USA Patriot Act" . . . "United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime. Cyber Security Enhancement Act of 2001" . . . "United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution. Fourth Amendment and the Internet" . . . "United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution. Fourth amendment issues raised by the FBI's \"Carnivore\" program" . . . "United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Oversight and Investigations. Hearing II on information technology" . . . "United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Oversight and Investigations. Hearing III on information technology" . . . "United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development Cybersecurity" . . . "United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection" . . . "United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development Industry speaks on cybersecurity" . . . "United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development Overview of the cyber problem" . . . "United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development The invisible battleground" . . . "United States. Congress. Senate. Committee on Appropriations. Subcommittee on Commerce, Justice, State, the Judiciary, and Related Agencies. Cybercrime" . . . "United States. Congress. Senate. Committee on Banking, Housing, and Urban Affairs. Subcommittee on Financial Institutions The \"ILOVEYOU\" virus and its impact on the U.S. financial services industry" . . . "United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Millennium Digital Commerce Act, S. 761" . . . "United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Communications. Internet security" . . . "United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. Computer security in the federal government" . . . "United States. Congress. Senate. Committee on Governmental Affairs. How secure is our critical infrastructure?" . . . "United States. Congress. Senate. Committee on the Judiciary. Securing electronic personal data" . . . "United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Cyber attacks" . . . "United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Terrorism, Technology, and Homeland Security. Virtual threat, real terror" . . . "United States. Congress. Senate. Committee on the Judiciary. The Computer Fraud and Abuse Act of 1986" . . . "United States. Congress. Senate. Committee on the Judiciary. The dark side of a bright idea" . . . "United States. General Accounting Office. Computer security" . . . "United States. General Accounting Office. Critical infrastructure protection" . . . "United States. General Accounting Office. Critical infrastructure protection" . . . "United States. General Accounting Office. Electronic government" . . . "United States. General Accounting Office. Employee privacy" . . . "United States. General Accounting Office. Information security" . . . "United States. General Accounting Office. Information security" . . . "United States. General Accounting Office. Information security" . . . "Who goes there?" . . . "Wright, Benjamin, 1957- Business law and computer security" . . . "Yourdon, Edward Byte wars" . . "[Record generated for validation purposes.]" . "sh2008101478" . . . _:b435iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b435iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b435iddOtlocdOtgovauthoritiessubjectssh2008101478 "Work cat.: Defending your digital assets against hackers, crackers, spies, and thieves, c2000" . _:b435iddOtlocdOtgovauthoritiessubjectssh2008101478 "found" . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 "2008-02-06T00:00:00"^^ . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 "new"^^ . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b441iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 "2008-02-20T10:47:13"^^ . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 "revised"^^ . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b449iddOtlocdOtgovauthoritiessubjectssh2008101478 . . "Computer security--United States"@en . "[Record generated for validation purposes.]" . . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 "2008-02-06T00:00:00"^^ . _:b463iddOtlocdOtgovauthoritiessubjectssh2008101478 "new"^^ . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 "2008-02-20T10:47:13"^^ . _:b471iddOtlocdOtgovauthoritiessubjectssh2008101478 "revised"^^ .