Who might be lurking at your cyber front door? Is your system really secure? strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004.

Main Author: United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census.
Format: Book
Language: English
Published: Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2004.
Physical Description: iii, 170 pages : illustrations ; 24 cm.
Also available via Internet from the GPO Access web site. Address as of 3/1/05: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108%5Fhouse%5Fhearings&docid=f:96992.pdf; current access available via PURL.
Subjects:
LEADER 02687nam a2200529 a 4500
001 57766474
003 OCoLC
005 20050317091728.3
008 050301s2004 waua b f000 0 eng c
020 |a 0160742188 
035 |a (GPO)apn2005-005392 
037 |a 552-070-32255-8  |b GPO 
040 |a GPO  |b eng  |c GPO 
042 |a pcc 
043 |a n-us--- 
049 |a COMN 
050 1 4 |a KF27  |b .G679 2004g 
074 |a 1016-B (online) 
086 0 |a Y 4.G 74/7:C 99/4 
088 |a Serial no. 108-232 (United States. Congress. House. Committee on Government Reform) 
110 1 |a United States.  |b Congress.  |b House.  |b Committee on Government Reform.  |b Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. 
245 1 0 |a Who might be lurking at your cyber front door? Is your system really secure? :  |b strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. 
264 1 |a Washington :  |b U.S. G.P.O. :  |b For sale by the Supt. of Docs., U.S. G.P.O.,  |c 2004. 
300 |a iii, 170 pages :  |b illustrations ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
500 |a Distributed to some depository libraries in microfiche. 
500 |a Shipping list no.: 2005-0086-P. 
530 |a Also available via Internet from the GPO Access web site. Address as of 3/1/05: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108%5Fhouse%5Fhearings&docid=f:96992.pdf; current access available via PURL. 
504 |a Includes bibliographical references. 
500 |a "Serial no. 108-232." 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Computer security  |z United States. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Cyberterrorism  |x Prevention. 
907 |a .b25542047  |b cug   |c -  |d 050310  |e 230523 
998 |a cug  |b 060904  |c m  |d a   |e -  |f eng  |g wau  |h 0  |i 0 
902 |a 060630 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a OCLC offline update by CMU 
989 |a Y 4.G 74/7:C 99/4  |d cusgh  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 67  |k 050317  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |1 .i44403781  |u http://purl.access.gpo.gov/GPO/LPS58365