Cybersecurity & Infrastructure

Get official Federal policy and guidance about cyberspace operations, and international electronic monitoring to help prevent global cyber conflicts and data leak attacks.

36 items
Page 1 of 2
Intelligence Community Legal Reference Book, Winter 2020
Title:
Intelligence Community Legal Reference Book, Winter 2020

Intelligence Community Legal Reference Book, Winter 2020

FBI Story 2019
Title:
FBI Story 2019

FBI Story 2019

Challenges To Security In Space
Title:
Challenges to Security in Space

Challenges To Security In Space

Silent Partners: Organized Crime, Irregular Groups, and Nation-States
Title:
Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Implications Of Service Cyberspace Component Commands For Army Cyberspace Operations
Title:
Implications of Service Cyberspace Component Commands for Army Cyberspace Operations

Implications Of Service Cyberspace Component Commands For Army Cyberspace Operations

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable
Title:
Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas
Title:
"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

Cybersecurity for Small Business
Title:
Cybersecurity for Small Business

Cybersecurity for Small Business

Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)
Title:
Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)

Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)

Beyond Convergence: World Without Order
Title:
Beyond Convergence: World Without Order

Beyond Convergence: World Without Order

Net Cetera: Chatting With Kids About Being Online
Title:
Net Cetera: Chatting With Kids About Being Online

Net Cetera: Chatting With Kids About Being Online

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent
Title:
The Pentagon's Pivot: How Lead Users Are Transforming Defense Product Development

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent

Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11
Title:
Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11

Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies
Title:
Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
Title:
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)
Title:
Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)
Title:
Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)
Title:
Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)
Title:
Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

A Study of Active Shooter Incidents in the United States Between 2000 and 2013
Title:
A Study of Active Shooter Incidents in the United States Between 2000 and 2013

A Study of Active Shooter Incidents in the United States Between 2000 and 2013

National Interoperability Field Guide Version 1.6.1 June 2016
Title:
National Interoperability Field Guide Version 1.6.1 June 2016

National Interoperability Field Guide Version 1.6.1 June 2016

The FBI Story 2015
Title:
The FBI Story 2015

The FBI Story 2015

The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014
Title:
The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014

The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014

2014 The FBI Story
Title:
2014 The FBI Story

2014 The FBI Story

Pages

Back to Top