Skip to main content

Search results for "fitness education"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 32 results by relevance
Consensus Study Report

A 21st Century Cyber-Physical Systems Education  (2016)

Consensus Study Report

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration  (2021)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Consensus Study Report

Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making  (2013)

Consensus Study Report

Asking the Right Questions About Electronic Voting  (2006)

Consensus Study Report

Improving State Voter Registration Databases: Final Report  (2010)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Proceedings

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop  (2016)

Consensus Study Report

Additional Observations on Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions: An Annex: Unclassified Abbreviated Version of a Classified Report  (2017)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)