Search Results for Computer networks -- Security measures -- United States - Narrowed by: Terrorism -- Government policy -- United States - Computer security -- United States -- PlanningSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bUnited$002bStates$0026qf$003dSUBJECT$002509Subject$002509Terrorism$002b--$002bGovernment$002bpolicy$002b--$002bUnited$002bStates$002509Terrorism$002b--$002bGovernment$002bpolicy$002b--$002bUnited$002bStates$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bUnited$002bStates$002b--$002bPlanning$002509Computer$002bsecurity$002b--$002bUnited$002bStates$002b--$002bPlanning$0026ps$003d300?dt=list2024-04-28T02:23:21ZCritical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:1038402024-04-28T02:23:21Z2024-04-28T02:23:21Zby Lewis, T. G., (Theodore Gyle), 1941-<br/>Author Lewis, T. G., (Theodore Gyle), 1941-<br/>Format: Books<br/>Call Number QA76.9.A25 L48 2006<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780471786283<br/>Critical infrastructure protection in homeland security defending a networked nationent://SD_ILS/0/SD_ILS:5681912024-04-28T02:23:21Z2024-04-28T02:23:21Zby Lewis, Theodore Gyle<br/>Author Lewis, Theodore Gyle<br/>Format: Computer file<br/>Call Number CP 8586<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780471786283<br/>