|
5G Network Slicing: Security Considerations for Design, Deployment, and Maintenance
by
really liked it 4.00 avg rating — 1 rating
—
2 editions
|
|
|
National Interoperability Field Operations Guide (NIFOG) Version 2.01 March, 2022: Cybersecurity and Infrastructure Security Agency - DHS
by
really liked it 4.00 avg rating — 1 rating
—
6 editions
|
|
|
Identity and Access Management: Recommended Best Practices for Administrators
by
|
|
|
CISA Open Source Software Security Roadmap
by
|
|
|
Compendium of Cybersecurity and Infrastructure Security Agency (CISA) Technology Evaluations: Publication: December 2023
by
0.00 avg rating — 0 ratings
|
|
|
Tips For: Securing Al system development
by
|
|
|
Project 25 (P25) Steering Committee Representative Handbook
by
0.00 avg rating — 0 ratings
|
|
|
The Who, What, When, Where Why, and How of Encryption in P25 Public Safety Land Mobile Radio Systems: May 2023
by
0.00 avg rating — 0 ratings
|
|
|
Interoperable Communications Technical Assistance Program: Service Offerings Guide Version 7.1, April 2023
by
0.00 avg rating — 0 ratings
|
|
|
Interoperable Communications Technical Assistance Program: Service Offerings Guide Version 7.1, April 2023
by
0.00 avg rating — 0 ratings
|
|
|
SAFECOM Guidance on: Fiscal Year 2023
by
0.00 avg rating — 0 ratings
|
|
|
Emergency Communications Technical Assistance and Planning Guide: FY2021 Highlights and Offerings, TA/SCIP Guide Version 6.1 (January 2021)
by
0.00 avg rating — 0 ratings
|
|
|
Approach for Developing an Interoperable Information Sharing Framework: Version 1.7, Publication: August 2021
by
0.00 avg rating — 0 ratings
|
|
|
Essentials of Alerts, Warnings, & Notifications: APRIL 2020
by
0.00 avg rating — 0 ratings
|
|
|
Approach for Developing an Interoperable Information Sharing Framework: Version 1.7, Publication: August 2021
by
0.00 avg rating — 0 ratings
|
|
|
A Hardware Bill of Materials: September 2023
by
0.00 avg rating — 0 ratings
|
|
|
CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every organization
by
|
|
|
CISA Tips: Preventing Web Application Access Control
by
0.00 avg rating — 0 ratings
|
|
|
CISA Tip: Increased Truebot Activity Infects U.S. and Canada Based Networks
by
0.00 avg rating — 0 ratings
|
|
|
The CISA Tips on: Guide To Securing Remote Access Software
by
|
|
|
Cybersecurity & Infrastructure Security Agency Tips: Stop Ransomware Guide
by
0.00 avg rating — 0 ratings
|
|
|
Cross-Sector Cybersecurity Performance Goals
by
0.00 avg rating — 0 ratings
|
|
|
CISA Strategic Plan 2023-2025: Publication September 2022
by
|
|
|
Identity and Access Management: Recommended Best Practices for Administrators
by
0.00 avg rating — 0 ratings
|
|
|
National Emergency Communications Plan [September 2019]: Cybersecurity and Infrastructure Security Agency
by
|
|
|
Cybersecurity Incident & Vulnerability Response Playbooks
by
0.00 avg rating — 0 ratings
|
|
|
Cybersecurity Incident & Vulnerability Response Playbooks: Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability Response Activities in FCEB Information Systems
by
|
|
|
Cybersecurity Awareness Month 2021 Toolkit: Key messaging, articles, social media, and more to promote Cybersecurity Awareness Month 2021
by
0.00 avg rating — 0 ratings
|
|
|
Insider Threat Mitigation Guide: Defining, Detecting, Assesing, and Managing Insider Threats: Cybersecurity and Infrastructure Security Agency
by
0.00 avg rating — 0 ratings
|
|
|
Defending Against Software Supply Chain Attacks
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.