Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
2015
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
2015
is
dcterms:subject
of
Start with Security: A Guide for Business
Cyber Incident Management Planning Guide
Federal Information Management Security Act: Annual Report to Congress
OECD Digital Economy Outlook 2015
United States Coast Guard Cyber Strategy
Fox Broadcasting v. Dish Network
Ransomware on the Rise: FBI and Partners Working to Combat This Cyber Threat
2015 Data Breach Investigations Report
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff
Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions
A Review of the U.S. Navy Cyber Defense Capabilities: Abbreviated Version of a Classified Report
ACSC 2015 Threat Report
Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes
Cybersecurity: Authoritative Reports and Resources, by Topic
Cybersecurity Issues for the Bulk Power System
Keystones to Foster Inclusive Knowledge Societies; Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
Report on Cybersecurity Practices
Strengthening our Nation's Cyber Defenses
Quadrennial Technology Review
Cyber Operations in DOD Policy and Plans: Issues for Congress
Insecurity in the Internet of Things (IoT)
Executive Order B-34-15
The European Agenda on Security
Responsibilities of Third-Party Service Providers under FERPA
Framework for Cyber-Physical Systems
Internet of Things Poses Opportunities for Cyber Crime
NISTIR 8053
3D Printing: Opportunities, Challenges, and Policy Implications of Additive Manufacturing
Bulk Collection of Signals Intelligence: Technical Options
Cybersecurity Risk Management and Best Practices (WG4): Final Report
The Internet of Things: Frequently Asked Questions
Research Roadmap for Smart Fire Fighting
Make or Break: The UK's Digital Future
BCP's Office of Technology Research and Investigation: The next generation in consumer protection
Executive Order 13694: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities
Industrial Internet of Things: Unleashing the Potential of Connected Products and Services
Strategies for Improving the U.S. Payment System
Best Practices for Victim Response and Reporting of Cyber Incidents
CONNECTing the Dots: Options for Future Action
CIS Controls for Effective Cyber Defense Version 6.0
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
Cybersecurity: Actions Needed to Address Challenges Facing Federal Systems
NISTIR 7904
Virtual Currencies
Open Internet Order
Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law
Prosecuting Intellectual Property Crimes
Cybersecurity Guidance
Internet Management: Structured Evaluation Could Help Assess Proposed Transition of Key Domain Name and Other Technical Functions
Transmission Operations Reliability Standards and Interconnection Reliability Operations and Coordination Reliability Standards
Careful Connections: Building Security in the Internet of Things
Notice of Inquiry: Mass Digitization Pilot Program
​Best Practices Guide for DoD Cloud Mission Owners
Promoting Private Sector Cybersecurity Information Sharing
NIST Special Publication 800-70
NIST Special Publication SP 800-171
Orphan Works and Mass Digitization: A Report of the Register of Copyrights
NIST Special Publication 800-82
Integrated DoD Intelligence Priorities
NISTIR 8080
A Digital Single Market Strategy for Europe
Cybersecurity Best Practices Guide
Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
Defense Additive Manufacturing: DOD Needs to Systematically Track Department-wide 3D Printing Efforts
Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum
FACT SHEET: Enhancing and Strengthening the Federal Government's Cybersecurity
Enforcement Policy Statement on Deceptively Formatted Advertisements
Actions to Strengthen Cybersecurity and Protect Critical IT Systems
Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data
E-mail Account Compromise
Policy Implications of the Internet of Things
CNSSI No. 4009
TeslaCrypt
DMCA Notice-and-Takedown Processes: List of Good, Bad, and Situational Practices
IoTivity
Worldwide Threat Assessment of the U.S. Intelligence Community
Executive Order 13702
Killing by Machine: Key Issues for Understanding Meaningful Human Control
Guidance Update No. 2015-02
Protection of Digital Computer and Communication Systems and Network
NIST Special Publication 800-176
Medical Devices Data Systems, Medical Image Storage Devices, and Medical Image Communications Devices
GPS: Actions Needed to Address Ground System Development Problems and User Equipment Production Readiness
Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems
ARSC Guide to Audio Preservation
Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen
GAO Reports - 2015
DoD Cloud Computing Security Requirements Guide
Rosen v. eBay
Cyber Threat Intelligence Integration Center
2015 National Security Strategy
Copyright and the Music Marketplace
Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry
Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port Cybersecurity
Big Data and Differential Pricing
Cybersecurity: Bank and Other Depository Regulators Need Better Data Analytics and Depository Institutions Want More Usable Threat Information
CRS Reports - 2015
Royal Canadian Mounted Police Cybercrime Strategy
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 2
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software