Skip to main content

Search results for "security breaches"

Viewing 1 - 20 of 209 results by relevance
Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Consensus Study Report

Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research  (2009)

Consensus Study Report

Promoting Chemical Laboratory Safety and Security in Developing Countries  (2010)

Airport Terminal Incident Response Planning  (2014)

Proceedings

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop  (2016)

Consensus Study Report

Letter Report on Information Technology Research for E-Government  (2001)

Proceedings

Estimating the Prevalence of Human Trafficking in the United States: Considerations and Complexities: Proceedings of a Workshop–in Brief  (2019)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Proceedings

Engaging Scientists to Prevent Harmful Exploitation of Advanced Data Analytics and Biological Data: Proceedings of a Workshop—in Brief  (2023)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Review of Tax Processing System Planning for the Internal Revenue Service  (1980)

Privacy and Security in the 21st Century: Who Knows and Who Controls?: Proceedings of a Forum  (2019)

Consensus Study Report

Cybersecurity Today and Tomorrow: Pay Now or Pay Later  (2002)

Consensus Study Report

Cryptography and the Intelligence Community: The Future of Encryption  (2022)

Being Prepared for IROPS: A Business-Planning and Decision-Making Approach  (2014)