Listing 1 - 10 of 23 | << page >> |
Sort by
|
Choose an application
Terrorism --- Cyberterrorism --- Computer security --- Computer networks --- National security --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Social Sciences --- Homeland defense --- Homeland security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Prevention --- Security measures --- Distributed processing --- Protection --- Prevention.
Choose an application
Choose an application
This report discusses several questions about voting-system security. To address these questions, this report begins with a description of the historical and policy context of the controversy. That is followed by an analysis of the issues in the broader context of computer security. The next section discusses several proposals that have been made for addressing those issues, and the last section discusses options for action that might be considered by policymakers.
Choose an application
Computer crimes --- Computer security --- Cyberterrorism --- Computer networks --- Prevention. --- Government policy --- Security measures
Choose an application
Grants-in-aid --- Research grants --- Federal aid to research --- United States.
Choose an application
Science and state --- Technology and state --- Agriculture --- Government policy --- Research
Choose an application
This report discusses several questions about voting-system security. To address these questions, this report begins with a description of the historical and policy context of the controversy. That is followed by an analysis of the issues in the broader context of computer security. The next section discusses several proposals that have been made for addressing those issues, and the last section discusses options for action that might be considered by policymakers.
Choose an application
Choose an application
Embedded Internet devices --- Internet of things. --- Government policy
Choose an application
Computer crimes --- Computer security --- Cyberterrorism --- Computer networks --- Prevention. --- Government policy --- Prevention. --- Security measures
Listing 1 - 10 of 23 | << page >> |
Sort by
|