This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-15 of 15)
Computer security -- Government policy -- United States.
1
2008
Cyber-security and threat politics : US efforts to secure the information age
Dunn Cavelty, Myriam.
London : Routledge, 2008
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Dun/Csa
AVAILABLE
2
2007
Cyber-Security and Threat Politics : US Efforts to Secure the Information Age
Cavelty, Myriam Dunn
Rating:
Electronic Resources
3
2008
Cyber-security and threat politics : US efforts to secure the information age
Dunn Cavelty, Myriam
Rating:
Electronic Resources
4
2022
Cybersecure the future : ransomware
Teyema, Trent R., author
Washington, DC : Atlantic Council, 2022
Rating:
Electronic Resources
5
2012
Federal Cloud Computing : the Definitive Guide for Cloud Service Providers
Metheny, Matthew.
Rating:
Electronic Resources
More...
6
2017
Federal cloud computing : the definitive guide for cloud service providers
Metheny, Matthew, author.
Second edition
Cambridge, MA : Syngress, is an imprint of Elsevier, [2017]
Rating:
Electronic Resources
7
2016
Federal cybersecurity : identification and mitigation efforts of sector-specific agencies
New York : Novinka, [2016]
Rating:
Electronic Resources
8
2016
FISMA Principles and Best Practices : Beyond Compliance
Howard, Patrick D., author Chief Information Security Officer, Nuclear Regulatory Commission, USA
1st
Auerbach Publications, 2016
Rating:
Electronic Resources
9
2016
Hacked : the inside story of America's struggle to secure cyberspace
Mitchell, Charlie, 1962- author
Lanham : Rowman & Littlefield, [2016]
Rating:
Electronic Resources
10
2013
IT supply chain security : review of government and industry efforts : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives
United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations, author.
Washington : U.S. Government Printing Office, 2013
Rating:
Electronic Resources
11
1995
Legislating privacy : technology, social values, and public policy
Regan, Priscilla M.
Chapel Hill : University of North Carolina Press, [1995]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
323.4480973 Reg/Lpt
AVAILABLE
12
1995
Legislating privacy : technology, social values, and public policy
Regan, Priscilla M., author.
Rating:
Electronic Resources
13
2017
A Nonstate Strategy for Saving Cyberspace
Healey, Jason, author.
Washington, D.C. : Atlantic Council, [2017]
Rating:
Electronic Resources
14
2000
Practices for securing critical information assets
Rating:
Electronic Resources
15
2022
Preparing the next phase of US cyber strategy
Jun, Jenny, author
Washington, DC : Atlantic Council, 2022
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search