Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,018
result(s) for
"Computer security United States Planning."
Sort by:
Defensive security handbook : best practices for securing infrastructure
by
Brotherston, Lee, author
,
Berlin, Amanda, author
in
Computer networks Security measures United States.
,
Computer security United States Planning.
,
Computer security United States Management.
2017
\"Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system adminstrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.\" --Back cover.
Critical Infrastructure Protection in Homeland Security
2014
\"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs.\" (Computing Reviews.com, March 22, 2007) \"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment.\" (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.
Redefining Information Warfare Boundaries for an Army in a Wireless World
by
Porche, Isaac R. III
,
Sollinger, Jerry M
,
Paul, Christopher
in
Building
,
Buildings
,
Communication systems
2013
The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U.S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.
The Other Quiet Professionals
by
Porche III, Isaac R
,
Paul, Christopher
,
Axelband, Elliot
in
Computer networking and communications
,
Computer networks
,
Computing and Information Technology
2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
Working Longer: The Solution to the Retirement Income Challenge
by
Steven A. Sass
,
Alicia H. Munnell
in
Age and employment
,
Age and employment -- United States
,
Aged
2009,2008
Daily headlines warn American workers that their retirement years may be far from golden. The average worker needs more retirement income than ever, due to increased life expectancy and soaring health care costs. But the main components of the retirement income system—Social Security and employer-provided pensions—are on the decline. What s more, fewer employers are providing retiree health insurance, forcing households to purchase their own coverage or do without.
Healthcare Cybersecurity
by
Gantt, W. Andrew H
in
Computer security-Law and legislation-United States
,
Data protection-Law and legislation-United States
,
Health services administration-Information technology-Law and legislation-United States
2021
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information.The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System
2014
The United States Department of Veterans Affairs has implemented an electronic asynchronous \"Secure Messaging\" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging.
The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging.
We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends.
The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries.
Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.
Journal Article
IoT in urban development: insight into smart city applications, case studies, challenges, and future prospects
by
Elshafie, Hashim
,
Salih, Sayeed
,
Motwakel, Abdelwahed
in
Case studies
,
City planning
,
Cloud computing
2025
With the integration of Internet of Things (IoT) technology, smart cities possess the capability to advance their public transportation modalities, address prevalent traffic congestion challenges, refine infrastructure, and optimize communication frameworks, thereby augmenting their progression towards heightened urbanization. Through the integration of sensors, cell phones, artificial intelligence (AI), data analytics, and cloud computing, smart cities worldwide are evolving to be more efficient, productive, and responsive to their residents’ needs. While the promise of smart cities has been marked over the past decade, notable challenges, especially in the realm of security, threaten their optimal realization. This research provides a comprehensive survey on IoT in smart cities. It focuses on the IoT-based smart city components. Moreover, it provides explanation for integrating different technologies with IoT for smart cities such as AI, sensing technologies, and networking technologies. Additionally, this study provides several case studies for smart cities. In addition, this study investigates the challenges of adopting IoT in smart cities and provides prevention methods for each challenge. Moreover, this study provides future directions for the upcoming researchers. It serves as a foundational guide for stakeholders and emphasizes the pressing need for a balanced integration of innovation and safety in the smart city landscape.
Journal Article
Choices for America in a turbulent world
2015
\"The first in a series exploring the elements of a national strategy for U.S. foreign policy, this book examines the most critical decisions likely to face the next president. The book covers global and regional issues and spotlights the long-term policy issues and organizational, financial, and diplomatic challenges that will confront senior U.S. officials in 2017 and beyond.\" --
Technology disaster response and recovery planning
2015
As libraries depend more and more on technology to provide essential services, they need to create a comprehensive response and recovery plan in the event of floods, fire, or other natural-- or man made-- disasters. This guide includes lessons learned from successful efforts in providing digital continuity and recovering from a variety of situations.