Computer security -- United States
Label
Computer security -- United States
Name
Computer security
Focus
Actions
Incoming Resources
- Subject of21
- Cyber Sense Act of 2019, report (to accompany H.R. 360)
- The unwanted gaze, the destruction of privacy in America, Jeffrey Rosen
- National Institute of Standards and Technology Reauthorization Act of 2018, report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- Cybersecurity recommendations for the next administration, hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
- DHS's effort to secure .gov, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, June 24, 2015
- Coordinating Oversight, Upgrading and Innovating Technology, and Examiner Reform Act of 2019, report (to accompany H.R. 2514) (including cost estimate of the Congressional Budget Office)
- Harvesting American Cybersecurity Knowledge through Education Act of 2019, report of the Committee on Commerce, Science, and Transportation on S. 2775
- Enhancing and implementing the cybersecurity elements of the sector-specific plans, joint hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology joint with the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 31, 2007
- Cyber privacy, who has your data and why you should care, April Falcon Doss
- DHS cybersecurity, roles and responsibilities to protect the nation's critical infrastructure : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Ghost in the wires, my adventures as the world's most wanted hacker, Kevin Mitnick with William L. Simon
- DHS Roles and Responsibilities in Cyber Space Act, report (to accompany H.R. 5658) (including cost estimate of the Congressional Budget Office)
- Tribal Health Data Improvement Act of 2020, report (to accompany H.R. 7948)
- Enhancing Grid Security through Public-Private Partnerships Act, report (to accompany H.R. 359)
- SBA Cyber Awareness Act, report (to accompany H.R. 3462)
- Promoting and incentivizing cybersecurity best practices, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- The electronic privacy papers, documents on the battle for privacy in the age of surveillance, [edited by] Bruce Schneier, David Banisar
- Dawn of the code war, America's battle against Russia, China, and the rising global cyber threat, John P. Carlin with Garrett M. Graff
- Protecting maritime facilities in the 21st century, are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
Outgoing Resources
- Focus1
- Sub focus1