{ "id": "R42507", "type": "CRS Report", "typeId": "REPORT", "number": "R42507", "active": false, "source": "University of North Texas Libraries Government Documents Department", "versions": [ { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812808/", "id": "R42507_2015Jun10", "date": "2015-06-10", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150610_R42507_a37e21b342a8b4df6fa2bdd81fac91dbdefd0339.pdf" }, { "format": "HTML", "filename": "files/20150610_R42507_a37e21b342a8b4df6fa2bdd81fac91dbdefd0339.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc820598/", "id": "R42507_2015May07", "date": "2015-05-07", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150507_R42507_f03d0d89f25e819f39ad9df063201f22815c07fd.pdf" }, { "format": "HTML", "filename": "files/20150507_R42507_f03d0d89f25e819f39ad9df063201f22815c07fd.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc627154/", "id": "R42507_2015Apr28", "date": "2015-04-28", "retrieved": "2015-06-15T14:46:40", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150428_R42507_d75c53f264c0fb98c3e0deb009494e45525c51c1.pdf" }, { "format": "HTML", "filename": "files/20150428_R42507_d75c53f264c0fb98c3e0deb009494e45525c51c1.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc505562/", "id": "R42507_2015Mar13", "date": "2015-03-13", "retrieved": "2015-05-29T05:37:21", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150313_R42507_30e557048a8a2791da5bd47ac8e047ecd271ab94.pdf" }, { "format": "HTML", "filename": "files/20150313_R42507_30e557048a8a2791da5bd47ac8e047ecd271ab94.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc503534/", "id": "R42507_2015Feb27", "date": "2015-02-27", "retrieved": "2015-04-30T17:37:21", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150227_R42507_862a35a78bbd146a63b04fa080b8a66597226d51.pdf" }, { "format": "HTML", "filename": "files/20150227_R42507_862a35a78bbd146a63b04fa080b8a66597226d51.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc503613/", "id": "R42507_2015Feb03", "date": "2015-02-03", "retrieved": "2015-04-30T17:37:21", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150203_R42507_7a896a2eb87188221892ad9c4faf9af5fc061556.pdf" }, { "format": "HTML", "filename": "files/20150203_R42507_7a896a2eb87188221892ad9c4faf9af5fc061556.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc503611/", "id": "R42507_2015Jan09", "date": "2015-01-09", "retrieved": "2015-04-30T17:37:21", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150109_R42507_2fa7df96cdd5fc5d01c9e3b6b10589bbfc8b174a.pdf" }, { "format": "HTML", "filename": "files/20150109_R42507_2fa7df96cdd5fc5d01c9e3b6b10589bbfc8b174a.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc491088/", "id": "R42507_2014Oct14", "date": "2014-10-14", "retrieved": "2015-01-27T19:40:46", "title": "Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20141014_R42507_23700e7175ed4621863f3909ec11e6394a42a257.pdf" }, { "format": "HTML", "filename": "files/20141014_R42507_23700e7175ed4621863f3909ec11e6394a42a257.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc810717/", "id": "R42507_2014Jul25", "date": "2014-07-25", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140725_R42507_2dd9ad04130f2493da9c812accc145666afc369f.pdf" }, { "format": "HTML", "filename": "files/20140725_R42507_2dd9ad04130f2493da9c812accc145666afc369f.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc822526/", "id": "R42507_2014Jul18", "date": "2014-07-18", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140718_R42507_6bf28ae2118ccdb66e3c4b9360a2aeea11640d71.pdf" }, { "format": "HTML", "filename": "files/20140718_R42507_6bf28ae2118ccdb66e3c4b9360a2aeea11640d71.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc306561/", "id": "R42507_2014May30", "date": "2014-05-30", "retrieved": "2014-07-08T21:53:44", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140530_R42507_eda6a30ff6d2cbbdaa10f164cf85389e93907082.pdf" }, { "format": "HTML", "filename": "files/20140530_R42507_eda6a30ff6d2cbbdaa10f164cf85389e93907082.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc306502/", "id": "R42507_2014May22", "date": "2014-05-22", "retrieved": "2014-07-08T21:53:44", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140522_R42507_8c25c2b9675dfa52e4f6adaf96036c4aa5d8b20e.pdf" }, { "format": "HTML", "filename": "files/20140522_R42507_8c25c2b9675dfa52e4f6adaf96036c4aa5d8b20e.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc806875/", "id": "R42507_2014May09", "date": "2014-05-09", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140509_R42507_0bb1f94534985beeb36042ed0f8941e6348ec637.pdf" }, { "format": "HTML", "filename": "files/20140509_R42507_0bb1f94534985beeb36042ed0f8941e6348ec637.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc306484/", "id": "R42507_2014May02", "date": "2014-05-02", "retrieved": "2014-07-08T21:53:44", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140502_R42507_2733f9357e8608a90e80a1cad076b72f9e9aa680.pdf" }, { "format": "HTML", "filename": "files/20140502_R42507_2733f9357e8608a90e80a1cad076b72f9e9aa680.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc808836/", "id": "R42507_2014Apr25", "date": "2014-04-25", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140425_R42507_505ba8aa44bab38f77da07e013880e14f6e45541.pdf" }, { "format": "HTML", "filename": "files/20140425_R42507_505ba8aa44bab38f77da07e013880e14f6e45541.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc284460/", "id": "R42507_2014Apr03", "date": "2014-04-03", "retrieved": "2014-05-06T21:21:54", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140403_R42507_aef84ee22887ff6a2902944c3eae785da78be411.pdf" }, { "format": "HTML", "filename": "files/20140403_R42507_aef84ee22887ff6a2902944c3eae785da78be411.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc818188/", "id": "R42507_2014Mar25", "date": "2014-03-25", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140325_R42507_b46fdbc7ea111875742f47ffb14c557fed6302bd.pdf" }, { "format": "HTML", "filename": "files/20140325_R42507_b46fdbc7ea111875742f47ffb14c557fed6302bd.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc814048/", "id": "R42507_2014Feb19", "date": "2014-02-19", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140219_R42507_949e46e1265e835585410d23e8f5c57c9f9d0e0c.pdf" }, { "format": "HTML", "filename": "files/20140219_R42507_949e46e1265e835585410d23e8f5c57c9f9d0e0c.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812942/", "id": "R42507_2014Feb05", "date": "2014-02-05", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140205_R42507_f50165608c8f6cf414ca47322a60558fd5919185.pdf" }, { "format": "HTML", "filename": "files/20140205_R42507_f50165608c8f6cf414ca47322a60558fd5919185.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462130/", "id": "R42507_2014Jan23", "date": "2014-01-23", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140123_R42507_b4967c9348a175f3012b9067464c488aef562fa2.pdf" }, { "format": "HTML", "filename": "files/20140123_R42507_b4967c9348a175f3012b9067464c488aef562fa2.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462557/", "id": "R42507_2014Jan09", "date": "2014-01-09", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140109_R42507_c088f41814e40f05f7c1fe0ff028735b0b929a31.pdf" }, { "format": "HTML", "filename": "files/20140109_R42507_c088f41814e40f05f7c1fe0ff028735b0b929a31.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812289/", "id": "R42507_2014Jan08", "date": "2014-01-08", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20140108_R42507_01ae7ac51c09ec6f7363d58e67981aed26a2ce67.pdf" }, { "format": "HTML", "filename": "files/20140108_R42507_01ae7ac51c09ec6f7363d58e67981aed26a2ce67.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc822541/", "id": "R42507_2013Dec04", "date": "2013-12-04", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20131204_R42507_5e090fe7e254f05ffbb9f616967186430ff0e23d.pdf" }, { "format": "HTML", "filename": "files/20131204_R42507_5e090fe7e254f05ffbb9f616967186430ff0e23d.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc816028/", "id": "R42507_2013Nov21", "date": "2013-11-21", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources, by Topic", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20131121_R42507_02d2edf53a3040d6e01b41b3057574e5c1759d93.pdf" }, { "format": "HTML", "filename": "files/20131121_R42507_02d2edf53a3040d6e01b41b3057574e5c1759d93.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc267877/", "id": "R42507_2013Oct25", "date": "2013-10-25", "retrieved": "2013-12-03T12:16:12", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20131025_R42507_ac228f20691497d502e4811175adfda240596af8.pdf" }, { "format": "HTML", "filename": "files/20131025_R42507_ac228f20691497d502e4811175adfda240596af8.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Security measures", "name": "Security measures" }, { "source": "LIV", "id": "Internet", "name": "Internet" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc227763/", "id": "R42507_2013Sep20", "date": "2013-09-20", "retrieved": "2013-11-05T18:07:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130920_R42507_35e86e3a614289840b0d1614674807cc433b82ad.pdf" }, { "format": "HTML", "filename": "files/20130920_R42507_35e86e3a614289840b0d1614674807cc433b82ad.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc227760/", "id": "R42507_2013Aug16", "date": "2013-08-16", "retrieved": "2013-11-05T18:07:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130816_R42507_f0f8d0c002b31e37bc36488db8c509f559637727.pdf" }, { "format": "HTML", "filename": "files/20130816_R42507_f0f8d0c002b31e37bc36488db8c509f559637727.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc821681/", "id": "R42507_2013Aug02", "date": "2013-08-02", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130802_R42507_93ec7097aeb13bd212fb75d9acd66af81b677bf8.pdf" }, { "format": "HTML", "filename": "files/20130802_R42507_93ec7097aeb13bd212fb75d9acd66af81b677bf8.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc227761/", "id": "R42507_2013Jul25", "date": "2013-07-25", "retrieved": "2013-11-05T18:07:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130725_R42507_b3aa7ad79a08b790bed513c7fad481e36e6d597b.pdf" }, { "format": "HTML", "filename": "files/20130725_R42507_b3aa7ad79a08b790bed513c7fad481e36e6d597b.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc810488/", "id": "R42507_2013Jul18", "date": "2013-07-18", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130718_R42507_6f9a3ad5487ecdfa08f008f09530a9a424c230d8.pdf" }, { "format": "HTML", "filename": "files/20130718_R42507_6f9a3ad5487ecdfa08f008f09530a9a424c230d8.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc818039/", "id": "R42507_2013Jul11", "date": "2013-07-11", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130711_R42507_007003a9f0e17205ae9b818235a9b6335f40dbab.pdf" }, { "format": "HTML", "filename": "files/20130711_R42507_007003a9f0e17205ae9b818235a9b6335f40dbab.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc813550/", "id": "R42507_2013Jul05", "date": "2013-07-05", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130705_R42507_55a6bad8a017da60153146cf0686700d92d3b01e.pdf" }, { "format": "HTML", "filename": "files/20130705_R42507_55a6bad8a017da60153146cf0686700d92d3b01e.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc227762/", "id": "R42507_2013Jun26", "date": "2013-06-26", "retrieved": "2013-11-05T18:07:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "Report that provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130626_R42507_58309147703755251036468b7c3a4e5a0439638c.pdf" }, { "format": "HTML", "filename": "files/20130626_R42507_58309147703755251036468b7c3a4e5a0439638c.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Internet", "name": "Internet" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "National defense", "name": "National defense" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815624/", "id": "R42507_2013Jun19", "date": "2013-06-19", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130619_R42507_b290a6625d9872aed6602126a6476538a82e52c7.pdf" }, { "format": "HTML", "filename": "files/20130619_R42507_b290a6625d9872aed6602126a6476538a82e52c7.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462922/", "id": "R42507_2013May24", "date": "2013-05-24", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130524_R42507_0cb9a34d2d50829107f2f4e1422c8c6aa7a22aaf.pdf" }, { "format": "HTML", "filename": "files/20130524_R42507_0cb9a34d2d50829107f2f4e1422c8c6aa7a22aaf.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462060/", "id": "R42507_2013May22", "date": "2013-05-22", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130522_R42507_43713eb9bf3a59218f174f07ec35010de5876a5e.pdf" }, { "format": "HTML", "filename": "files/20130522_R42507_43713eb9bf3a59218f174f07ec35010de5876a5e.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc808455/", "id": "R42507_2013May09", "date": "2013-05-09", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130509_R42507_f5fd57f05eed35aa76113a30dbe2498a2bfbbffe.pdf" }, { "format": "HTML", "filename": "files/20130509_R42507_f5fd57f05eed35aa76113a30dbe2498a2bfbbffe.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462636/", "id": "R42507_2013Apr17", "date": "2013-04-17", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130417_R42507_e772abb4e1ecca89e8feae3c25149b0416a6dde0.pdf" }, { "format": "HTML", "filename": "files/20130417_R42507_e772abb4e1ecca89e8feae3c25149b0416a6dde0.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815951/", "id": "R42507_2013Apr10", "date": "2013-04-10", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130410_R42507_34eb9de66e0a07e543376df64284723d9befb43f.pdf" }, { "format": "HTML", "filename": "files/20130410_R42507_34eb9de66e0a07e543376df64284723d9befb43f.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc809168/", "id": "R42507_2013Apr01", "date": "2013-04-01", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130401_R42507_4091c27fa91e584e91ff4b7d77d8f9821a2a0ab3.pdf" }, { "format": "HTML", "filename": "files/20130401_R42507_4091c27fa91e584e91ff4b7d77d8f9821a2a0ab3.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815678/", "id": "R42507_2013Mar22", "date": "2013-03-22", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130322_R42507_97087658a898def711d220a7df6d1b1d85deadf9.pdf" }, { "format": "HTML", "filename": "files/20130322_R42507_97087658a898def711d220a7df6d1b1d85deadf9.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc463359/", "id": "R42507_2013Mar20", "date": "2013-03-20", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130320_R42507_aec5a7dc8bf726fb9cd12d8d7ba23628f718b7d1.pdf" }, { "format": "HTML", "filename": "files/20130320_R42507_aec5a7dc8bf726fb9cd12d8d7ba23628f718b7d1.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc810039/", "id": "R42507_2013Mar14", "date": "2013-03-14", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130314_R42507_b39a2cce82cfd6346111a2f0c562c0b6699c1001.pdf" }, { "format": "HTML", "filename": "files/20130314_R42507_b39a2cce82cfd6346111a2f0c562c0b6699c1001.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc462495/", "id": "R42507_2013Mar08", "date": "2013-03-08", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130308_R42507_4213886214d5a5f06138b3f1573a00afc1a9cb55.pdf" }, { "format": "HTML", "filename": "files/20130308_R42507_4213886214d5a5f06138b3f1573a00afc1a9cb55.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815324/", "id": "R42507_2013Feb28", "date": "2013-02-28", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130228_R42507_b3ceed5cd736d623ab360301252791b85979233a.pdf" }, { "format": "HTML", "filename": "files/20130228_R42507_b3ceed5cd736d623ab360301252791b85979233a.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc463466/", "id": "R42507_2013Jan17", "date": "2013-01-17", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries\", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130117_R42507_2cb3e1ccaa6ae51f030e422b48205f6d62bbe995.pdf" }, { "format": "HTML", "filename": "files/20130117_R42507_2cb3e1ccaa6ae51f030e422b48205f6d62bbe995.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology policy", "name": "Technology policy" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc122226/", "id": "R42507_2012Sep11", "date": "2012-09-11", "retrieved": "2012-11-30T09:28:34", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120911_R42507_b19dddc8664e5874931fcfc0226fddc20cb82571.pdf" }, { "format": "HTML", "filename": "files/20120911_R42507_b19dddc8664e5874931fcfc0226fddc20cb82571.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc227758/", "id": "R42507_2012Jul24", "date": "2012-07-24", "retrieved": "2013-11-05T18:07:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120724_R42507_300208a1a7f5dcf308fb69c65d529d2dee6f1d79.pdf" }, { "format": "HTML", "filename": "files/20120724_R42507_300208a1a7f5dcf308fb69c65d529d2dee6f1d79.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc93941/", "id": "R42507_2012Jul03", "date": "2012-07-03", "retrieved": "2012-07-24T12:39:36", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120703_R42507_7797bbc0af68b577f059e37c3772608ca4ee4b55.pdf" }, { "format": "HTML", "filename": "files/20120703_R42507_7797bbc0af68b577f059e37c3772608ca4ee4b55.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc93929/", "id": "R42507_2012Jun08", "date": "2012-06-08", "retrieved": "2012-07-24T12:39:36", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120608_R42507_57e7397daf0d7fe1ed1c31573f91ea2d1c82282a.pdf" }, { "format": "HTML", "filename": "files/20120608_R42507_57e7397daf0d7fe1ed1c31573f91ea2d1c82282a.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc93930/", "id": "R42507_2012May08", "date": "2012-05-08", "retrieved": "2012-07-24T12:39:36", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120508_R42507_d84fb14d4fe252e9e248234027751626745808b6.pdf" }, { "format": "HTML", "filename": "files/20120508_R42507_d84fb14d4fe252e9e248234027751626745808b6.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc85416/", "id": "R42507_2012May02", "date": "2012-05-02", "retrieved": "2012-06-06T14:34:05", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since\r\n2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120502_R42507_a913ad0bdb2df7db81bd0c364daf4bf1492aea64.pdf" }, { "format": "HTML", "filename": "files/20120502_R42507_a913ad0bdb2df7db81bd0c364daf4bf1492aea64.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc87226/", "id": "R42507_2012Apr26", "date": "2012-04-26", "retrieved": "2012-07-03T07:51:21", "title": "Cybersecurity: Authoritative Reports and Resources", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120426_R42507_b9b32ce797fd11d8ca0bcb8137ebc0234901db59.pdf" }, { "format": "HTML", "filename": "files/20120426_R42507_b9b32ce797fd11d8ca0bcb8137ebc0234901db59.html" } ], "topics": [ { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Criminal justice", "name": "Criminal justice" }, { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] } ], "topics": [ "Economic Policy", "Foreign Affairs", "Intelligence and National Security", "National Defense", "Science and Technology Policy" ] }