Skip to main content

Search results for "foreign sources"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 20 results by relevance

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

Bulk Collection of Signals Intelligence: Technical Options  (2015)

Consensus Study Report

Assessing the Impacts of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment  (2009)

The Unpredictable Certainty: White Papers  (1997)

Consensus Study Report

The New Global Ecosystem in Advanced Computing: Implications for U.S. Competitiveness and National Security  (2012)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Bits of Power: Issues in Global Access to Scientific Data  (1997)

Consensus Study Report

Renewing U.S. Telecommunications Research  (2006)

Applying Advanced Information Systems to Ports and Waterways Management  (1999)

Internet Counts: Measuring the Impacts of the Internet  (1998)

Consensus Study Report

A Review of the FBI's Trilogy Information Technology Modernization Program  (2004)

Preserving Scientific Data on Our Physical Universe: A New Strategy for Archiving the Nation's Scientific Information Resources  (1995)

Consensus Study Report

Youth, Pornography, and the Internet  (2002)

Proceedings

Proceedings of the Workshop on Promoting Access to Scientific and Technical Data for the Public Interest: An Assessment of Policy Options  (1999)

Consensus Study Report

Analysis of Potential Interference Issues Related to FCC Order 20-48  (2023)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Defining a Decade: Envisioning CSTB's Second 10 Years  (1997)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)