Making federal computers secure : overseeing effective information security management : third report
Resource Information
The work Making federal computers secure : overseeing effective information security management : third report represents a distinct intellectual or artistic creation found in Indiana State Library. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Making federal computers secure : overseeing effective information security management : third report
Resource Information
The work Making federal computers secure : overseeing effective information security management : third report represents a distinct intellectual or artistic creation found in Indiana State Library. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Making federal computers secure : overseeing effective information security management : third report
- Title remainder
- overseeing effective information security management : third report
- Statement of responsibility
- by the Committee on Government Reform
- Language
- eng
- Additional physical form
- Also available via Internet from the GPO Access web site. Address as of 12/16/02: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi ?dbname=107c̲ongr̲eports&docid=f:hr764.107.pdf; current access is available via PURL.
- Cataloging source
- GSA
- Government publication
- federal national government publication
- Index
- no index present
- Literary form
- non fiction
- Nature of contents
- bibliography
- Series statement
- Report / 107th Congress, 2d session, House of Representatives
- Series volume
- 107-764
Context
Context of Making federal computers secure : overseeing effective information security management : third reportWork of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/Hr3rU7u1z-8/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/Hr3rU7u1z-8/">Making federal computers secure : overseeing effective information security management : third report</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Making federal computers secure : overseeing effective information security management : third report
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/Hr3rU7u1z-8/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/Hr3rU7u1z-8/">Making federal computers secure : overseeing effective information security management : third report</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>