Skip to main content

Search results for "security policies"

Viewing 1 - 20 of 486 results by relevance
Proceedings

Assessing Research Security Efforts in Higher Education: Proceedings of a Workshop  (2025)

Consensus Study Report

Science and Security in a Post 9/11 World: A Report Based on Regional Discussions Between the Science and Security Communities  (2007)

Consensus Study Report

Promoting Chemical Laboratory Safety and Security in Developing Countries  (2010)

Consensus Study Report

Preparing for an Aging World: The Case for Cross-National Research  (2001)

Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories  (1999)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Consensus Study Report

Trust in Cyberspace  (1999)

Consensus Study Report

For the Record: Protecting Electronic Health Information  (1997)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Proceedings

Incentivizing Urgency, Speed, and Scale to Support Future U.S. Innovation: Proceedings of a Workshop—in Brief  (2025)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Deploying Transportation Security Practices in State DOTs  (2023)

Geospatial Data Governance Policies and Procedures: A Guide  (2025)

Proceedings

The Gates Are Open: Control System Cyber-Physical Security for Facilities: Proceedings of a Federal Facilities Council Workshop—in Brief  (2021)

Proceedings

Strategic Innovation and Commercialization: Supporting IP and Tech Transfer to Advance U.S. Research Competitiveness: Proceedings of a Workshop—in Brief  (2023)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)