National security -- United States
Resource Information
The concept National security -- United States represents the subject, aboutness, idea or notion of resources found in Evansville Vanderburgh Public Library.
The Resource
National security -- United States
Resource Information
The concept National security -- United States represents the subject, aboutness, idea or notion of resources found in Evansville Vanderburgh Public Library.
- Label
- National security -- United States
- Authority link
- http://id.loc.gov/authorities/subjects/sh85140387
343 Items that share the Concept National security -- United States
Context
Context of National security -- United StatesSubject of
No resources found
No enriched resources found
- 2008-2009 Presidential transition : national security considerations and options
- 2012-2013 Presidential election period : national security considerations and options
- 2019 missile defense review
- A 21st century science, technology, and innovation strategy for America's national security
- A Spy in Plain Sight : The Inside Story of the FBI and Robert Hanssen--America's Most Damaging Russian Spy
- A federal strategy to ensure secure and reliable supplies of critical minerals
- A review of U.S. citizenship and immigration services' alien security checks
- A review of the use of stolen passports from visa waiver countries to enter the United States
- A shift in the international security environment : potential implications for defense--issues for Congress
- A shift in the international security environment : potential implications for defense--issues for Congress
- A spy in plain sight : the inside story of the FBI and Robert Hanssen - America's most damaging Russian spy
- A summary of fusion centers : core issues and options for Congress
- ADVISE could support intelligence analysis more effectively
- Adding countries to the Visa Waiver Program : effects on national security and tourism
- Agroterrorism : threats and preparedness
- Ai phase II : national security standards for artificial intelligence
- Al Qaeda in the Islamic Maghreb (AQIM) and related groups
- Alert
- America's covert border war : the untold story of the nation's battle to prevent jihadist infiltration
- America's war machine : vested interests, endless conflicts
- An Act to Ensure That the Federal Communications Commission Prohibits Authorization of Radio Frequency Devices That Pose a National Security Risk
- An Evaluation of DHS activities to implement Section 428 of the Homeland Security Act of 2002
- An abrupt climate change scenario and its implications for United States national security
- Annual report to the Congress on the Information Sharing Environment
- Artificial intelligence and national security
- Artificial intelligence and national security
- Assault on intelligence : American national security in an age of lies
- Attacks on federal government 2001-2013 : threat assessment considerations
- Audit of CBP export control activities : unclassified summary
- Audit of passenger and baggage screening procedures at domestic airports [electronic resource]
- Audit of targeting oceangoing cargo containers : (unclassified summary)
- Aviation security measures and domestic terrorism threats
- Balance Sheet : the Iraq War and U.S. National Security
- Ballistic missile defense : historical overview
- Ballistic missile defense review report
- Beryllium--important for national defense
- Bin Laden's bookshelf
- Border insecurity : why big money, fences, and drones aren't making us safer
- Border security : the role of the U.S. Border Patrol
- Building a more resilient ICT supply chain : lessons learned during the COVID-19 pandemic, an analysis
- Building a more resilient ICT supply chain : lessons learned during the COVID-19 pandemic, an analysis
- Building a more resilient ICT supply chain : lessons learned during the COVID-19 pandemic, an analysis
- Building civilian interagency capacity for missions abroad : key proposals and issues for Congress
- Building resilient supply chains, revitalizing American manufacturing, and fostering broad-based growth : 100-day reviews under Executive Order 14017
- CBP Has Improved Southwest Border Technology, but Significant Challenges Remain
- CBP has improved Southwest border technology, but significant challenges remain
- CBP has not demonstrated acquisition capabilities needed to secure the southern border
- CBP has not demonstrated acquisition capabilities needed to secure the southern border
- CISA should validate Priority Telecommunications Services performance data
- COVID-19 : national security and defense strategy
- Campaign and election security policy : brief introduction
- Campaign and election security policy : overview and recent developments for Congress
- Capstone concept for joint operations
- China's mineral industry and U.S. access to strategic and critical minerals : issues for Congress
- Climate change and national security : will extreme weather lead to more global conflict?
- Collaborative intelligence : using teams to solve hard problems
- Collaborative intelligence : using teams to solve hard problems
- Combating a modern hydra : Al Qaeda and the global war on terrorism
- Combatting targeted disinformation campaigns : a whole-of-society issue
- Commerce determines steel and aluminum imports threaten to impair national security
- Community Resilience Task Force recommendations
- Comprehensive National Cybersecurity Initiative : legal authorities and policy considerations
- Controlled access programs of the intelligence community
- Countering Violent Extremism (CVE) Working Group
- Countering corruption through U.S. foreign assistance
- Countering violent extremism in the United States
- Crashing the party : legacies and lessons from the RNC 2000
- Criminal prohibitions on leaks and other disclosures of classified defense information
- Critical infrastructures : background, policy, and implementation
- Cross border exercise support initiative
- Customs and Border Protection needs to improve its inspection procedures for the Western Hemisphere Travel Initiative
- Cyber incident severity schema
- Cybersecurity : an Introduction
- Cybersecurity : deterrence policy
- Cybersecurity : selected issues for the 115th Congress
- Cybersecurity: a primer
- Cybersecurity: comparison of selected cyber incident reporting bills : in brief
- Cybersecurity: homeland security issues for the 116th Congress
- DHS Strategic Action Plan to counter the threat posed by the People's Republic of China : defending the homeland in an era of great power competition
- DHS department-wide management of detection equipment
- DHS needs to improve the security posture of its cybersecurity program systems
- DHS' Domestic Nuclear Detection Office progress in integrating detection capabilities and response protocols
- DOD concerns about the FCC-approved Ligado network
- Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- Deep fakes and national security
- Defense capabilities : joint all domain command and control
- Defense intelligence strategy
- Defense primer : National Security Space Launch
- Defense primer : defense support of civil authorities
- Defense primer : information operations
- Defense primer : security cooperation
- Defense primer : the Defense Logistics Agency
- Defense space strategy summary
- Defining homeland security : analysis and Congressional considerations
- Definition of national emergency under the National Emergencies Act
- Department of Defense electromagnetic spectrum superiority strategy
- Department of Defense strategy for countering weapons of mass destruction
- Department of Defense strategy for operating in cyberspace
- Department of Homeland Security Information sharing strategy
- Department of Homeland Security appropriations, FY2018 : current action
- Department of Homeland Security strategic framework for countering terrorism and targeted violence
- Diplomatic security investigates
- Domestic approach to national intelligence
- Domestic investigation and operations guide
- Domestic violent extremism poses heightened threat in 2021
- Drift
- Drift : the unmooring of American military power
- EPA's emergency response systems at risk of having inadequate security controls
- Effectiveness of the Department of Homeland Security Traveler Redress Inquiry Program
- Energy Policy Act 2005, Section 1837 : national security review of international energy requirements
- Energy's digital future : harnessing innovation for Americanresilience and national security
- Establishing the Secretary's role : James Forrestal
- Evaluating DOD strategy : key findings of the National Defense Strategy Commission
- Evolution of the Secretary of Defense in the era of massive retaliation : Charles Wilson, Neil McElroy, and Thomas Gates, 1953-1961
- Expanded use of FY 2003 SHSGP II and FY 2003 UASI II funds
- Expanding the Secretary's role in foreign affairs : Robert McNamara and Clark Clifford 1963-1968
- FBI, Federal Bureau of Investigation
- FY2020 defense budget request : an overview
- FY2020 defense reprogrammings for wall funding : backgrounder
- FY2021 Defense budget request : an overview
- Fact sheet, The Protect America Act of 2007 : President Bush signs legislation modernizing foreign intelligence law to better protect America
- Fact sheet, presidential policy directive on United States cyber incident coordination
- Facts and fears : hard truths from a life in intelligence
- Facts and fears : hard truths from a life in intelligence
- Foreign affairs, defense, and trade : key issues for the 110th Congress
- Foreign affairs, defense, and trade : key issues or the 109th Congress
- Foreign terrorist organization (FTO)
- Forging a new shield
- Global Infectious Disease Threat and Its Implications for the United States
- Global strategic assessment 2009 : America's security role in a changing world
- Governing security : the hidden origins of American security agencies
- Guidance on late initial registration for TPS applicants
- H.R. 10 (9/11 Recommendations Implementation Act) and S. 2845 (National Intelligence Reform Act of 2004) : a comparative analysis
- Homeland Security : Coast Guard operations- background and issues for Congress
- Homeland Security : unmanned aerial vehicles and border surveillance
- Homeland Security Exercise and Evaluation Program update
- Homeland Security Exercise and Evaluation Program, Volume 1, Overview and doctrine
- Homeland Security Information Network improvements and challenges
- Homeland Security investigations, a directorate within the U.S. Immigration and Customs Enforcement : in brief
- Homeland security exercise and evaluation program
- Homeland threat assessment
- Homeland threat assessment
- House Select Committee on Homeland Security : possible questions raised if the panel were to be reconstituted as a standing committee
- House and Senate committee organization and jurisdiction : considerations related to proposed Department of Homeland Security
- How safe are we? : homeland security since 9/11
- IARPA : be the future
- Immigration : visa security policies
- Immigration security checks : how and why the process works
- Implementation plan for the national health security strategy of the United States of America
- Implementing 9/11 Commission recommendations : progress report 2011
- Implications for US national security of anticipated climate change
- Improvements needed in the process to certify carriers for the Free and Secure Trade Program
- In the shadow of Korematsu : democratic liberties and national security
- Information and Communications Technology Supply Chain Risk Management Task Force year 2 report : status update on activities and objectives of the task force
- Information and Communications Technology Supply Chain Risk Management Task Force year 2 report : status update on activities and objectives of the task force
- Information sharing with fusion centers has improved, but information system challenges remain
- Information warfare : issues for Congress
- Interim implementation guide for the National Health Security Strategy of the United States of America
- International crime threat assessment
- Islamist militancy in the Pakistan-Afghanistan border region and U.S. policy
- Joint All-Domain Command and Control (JADC2)
- Joint All-Domain Command and Control : background and issues for Congress
- Joint statement by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA)
- Layered homeland missile defense : a strategy for defending the United States
- Lines of fire : a renegade writes on strategy, intelligence, and security
- Marking classified national security information : as required by Executive Order 12958, as amended, Classified National Security Information, March 25, 2003 and ISOO implementing directive no. 1, effective September 22, 2003
- Military construction necessary to support the use of the armed forces in addressing the national emergency at the southern border
- Military readiness : is the Pentagon prepared for future threats?
- Missile defense : the current debate
- NCTC and information sharing five years since 9/11 : a progress report
- National Cyber Awareness System
- National Special Security Events
- National Special Security Events : fact sheet
- National aeronautical R&D goals : technology for America's future
- National biodefense strategy
- National biosurveillance science and technology roadmap
- National continuity policy : a brief overview
- National cyber strategy of the United States of America
- National defense strategy
- National emergency communications plan : urban area communications key findings and recommendations
- National health security strategy of the United States of America
- National preparedness goal
- National security and emergency preparedness communications : a summary of executive order 13618
- National security and nuclear weapons : maintaining deterrence in the 21st century
- National security implications of fifth generation (5G) mobile technologies
- National security letters in foreign intelligence investigations : a glimpse at the legal background
- National security letters in foreign intelligence investigations : legal background
- National security space launch
- National security space strategy : unclassified summary
- National space policy of the United States of America
- National space policy of the United States of America (2020)
- National strategy for combating terrorism
- National strategy for combating terrorism
- National strategy for countering biological threats
- National strategy for counterterrorism of the United States of America
- National strategy for homeland security
- National strategy for information sharing : successes and challenges in improving terrorism-related information sharing
- National strategy for information sharing and safeguarding
- National strategy for trusted identities in cyberspace : enhancing online choice, efficiency, security, and privacy
- National strategy to combat terrorist travel
- National strategy to combat terrorist travel of the United States of America
- National strategy to combat terrorist travel of the United States of America
- National strategy to combat weapons of mass destruction
- National strategy to secure 5G, of the United States of America
- Nazis y buenos vecinos : la campaña de los Estado Unidos contra los alemanes de América Latina durante la Segunda Guerra Mundial
- Nonproliferation spending and activities up dramatically in this administration
- North Korean ballistic missile threat to the United States
- North Korean cyber capabilities : in brief
- Nuclear arms control : the Strategic Offensive Reductions Treaty
- Nuclear posture review
- Nuclear posture review report
- Nuclear weapons and U.S. national security : a need for new weapons programs?
- Nuclear weapons in U.S. national security policy : past, present, and prospects
- ODP secure portal
- Office of the Director of National Intelligence
- Osama bin Laden's death : implications and considerations
- Overview of the National Planning Frameworks
- Patriots for profit : contractors and the military in U.S. national security
- Pedal to the metal : Commerce recommends revving up trade measures on steel and aluminum
- People crossing borders : an analysis of U.S. border protection policies
- Perspective on federal cybersecurity spending
- Possible use of FY2020 defense funds for border barrier construction : context and questions
- Post-9/11 national threat notification efforts : issues, actions, and options for Congress
- Preliminary assessment : unidentified aerial phenomena
- Press releases
- Progress and challenges in securing the Nation's cyberspace
- Progress made, but additional efforts are needed to secure the election infrastructure
- Protecting critical and emerging U.S. technologies from foreign threats
- Public hearing regarding the surveillance program operated pursuant to section 702 of the Foreign Intelligence Surveillance Act, March 19, 2014
- Publishing scientific papers with potential security risks : issues for Congress
- Quadrennial Review Advisory Committee final report
- Quadrennial roles and missions review report
- Rearming at the dawn of the Cold War : Louis Johnson, George Marshall, and Robert Lovett, 1949-1952
- Recent presidential trade actions affecting the U.S. power grid
- Reducing uncertainty : intelligence analysis and national security
- Regional training on homeland security exercise and evaluation program, Volume II, exercise evaluation
- Relationships between fusion centers and emergency operations centers
- Release of Abbottabad Compound material
- Release of Homeland security exercise and evaluation program, volume 1, overview and doctrine
- Reliable replacement warhead program
- Report on the progress of the Director of National Intelligence in implementing the "Intelligence Reform and Terrorism Prevention Act of 2004"
- Report to Congress regarding the Terrorism Information Awareness Program : in response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, [Subsection] 111(b)
- Review of controls over the export of chemical and biological commodities : (redacted)
- Review of the Transportation Security Administration's role in the use and dissemination of airline passenger data (redacted)
- Russia : foreign policy and U.S. relations
- Russian government cyber activity targeting energy and other critical infrastructure sectors
- S.Res. 445 : Senate committee reorganization for Homeland Security and intelligence matters
- Secret sessions of the House and Senate : authority, confidentiality, and frequency
- Section 232 investigations : overview and issues for Congress
- Section 232 investigations : overview and issues for Congress
- Securing freedom in the global commons
- Selected Homeland Security issues in the 115th Congress
- Selected Issues in homeland security policy for the 114th Congress
- Selected homeland security issues in the 116th Congress
- Small satellite boom poses challenges for regulators
- Sobre el poder y la ideologÃa : conferencias de Managua 2
- Space domain mission assurance : a resilience taxonomy : a white paper
- Spacepower : doctrine for space forces
- Spacepower : doctrine for space forces
- Spying on democracy : government surveillance, corporate power and public resistance
- State Department country report on terrorism : 2001-2016
- Storming the wall : climate change, migration, and homeland security
- Strategic approach for arctic homeland security
- Strategic competition and foreign policy : what is "political warfare"?
- Strategic implementation plan for empowering local partners to prevent violent extremism in the United States
- Strategy for homeland defense and civil support
- Summary of the 2018 national defense strategy of the United States of America : sharpening the American military's competitive edge
- Summary of the irregular warfare annex to the national defense strategy
- Survey of the information analysis and infrastructure protection directorate
- Sustainability and Efficiency Task Force recommendations
- Target capabilities list : a companion to the national preparedness guidelines
- Terminal operators and their role in U.S. port and maritime security
- Terrorism and transnational crime : foreign policy issues for Congress
- The "national security exception" and the World Trade Organization
- The 2015 National Security Strategy : authorities, changes, issues for Congress
- The 2017 national security strategy : issues for Congress
- The 2018 national defense strategy
- The Army's Multi-Domain Task Force (MDTF)
- The Coast Guard's Maritime Safety and Security Team program
- The Committee on Foreign Investment in the United State (CFIUS)
- The Committee on Foreign Investment in the United States
- The Committee on Foreign Investment in the United States (CFIUS)
- The Comprehensive National Cybersecurity Initiative
- The Department of Defense cyber strategy
- The Department of Homeland Security
- The Department of Homeland Security's "metering" policy : legal issues
- The Department of State's plan to implement the U.S. strategy on WOMEN, PEACE, AND SECURITY
- The Department of State's plan to implement the U.S. strategy on WOMEN, PEACE, AND SECURITY, 2020-2023
- The Director of National Intelligence (DNI)
- The National Counterintelligence and Security Center (NCSC) : an overview
- The National Reconnaissance Office at 50 years : a brief history
- The SAFE Acts of 2005 : H.R. 1526 and S. 737-- a sketch
- The Safety of the Kingdom : Government Responses to Subversive Threats
- The Visa Waiver Program
- The ascendancy of the Secretary of Defense : Robert S. McNamara, 1961-1963
- The assault on intelligence : American national security in an age of lies
- The avoidable war : the dangers of a catastrophic conflict between the US and Xi Jinping's China
- The avoidable war : the dangers of a catastrophic conflict between the US and Xi Jinping's China
- The avoidable war? : the dangers of a catastrophic conflict between the US and Xi Jinping's China
- The bomb : presidents, generals, and the secret history of nuclear war
- The border challenge : an insider's view of stopping drugs at America's borders
- The case for U.S. nuclear weapons in the 21st century
- The changing geopolitics of Asia : issues for Congress
- The effect of imports of aluminum on the national security : an investigation conducted under Section 232 of the Trade Expansion Act of 1962, as amended
- The effect of imports of steel on the national security : an investigation conducted under Section 232 of the Trade Expansion Act of 1962, as amended
- The electronic intrusion threat to national security and emergency preparedness (NS/EP) internet communications : an awareness document
- The elements of the China challenge
- The elements of the China challenge
- The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The fifth horseman and the new MAD : how massive attacks of disruption became the looming existential danger to a divided nation and the world at large
- The formative years 1947-1950
- The front end of the nuclear fuel cycle : current issues
- The generals have no clothes : the untold story of our endless wars
- The impact of terrorism on state law enforcement : adjusting to new roles and changing conditions : final report
- The intelligence community and its use of contractors : Congressional oversight issues
- The interim national security strategic guidance
- The national defense strategy of the United States of America
- The national security strategy of the United States of America
- The national strategy for maritime security
- The paradox of our national security complex
- The terrorist threat to the US homeland
- The visa waiver program : balancing tourism and national security
- The way of the world
- The way of the world : a story of truth and hope in an age of extremism
- Threats to U.S. national security interests in space : orbital debris mitigation and removal
- Threats to undersea cable communications
- Top ten challenges facing the next Secretary of Homeland Security
- Treasury's war : the unleashing of a new era of financial warfare
- Trump and his generals : the cost of chaos
- U.S. Secret Service protection mission funding and staffing : fact sheet
- U.S. restrictions on Huawei Technologies : national security, foreign policy, and economic interests
- U.S. strategy for engagement in Central America : an overview
- USA PATRIOT ACT reauthorization in brief
- USCIS to issue redesigned green card
- Unclassified report on the President's Surveillance Program
- Unclassified summary of information handling and sharing prior to the April 15, 2013 Boston Marathon bombings : Intelligence Community, Central Intelligence Agency, Department of Justice, Department of Homeland Security
- United States : areas of influence of major Mexican transnational criminal organizations
- United States Southern Command (SOUTHCOM)
- United States cyber incident coordination
- Update: threats to national security foiled? : a wrap up of new tariffs on steel and aluminum
- Vision 2015 : a globally networked and integrated intelligence enterprise
- Western unity and the transatlantic security challenge
- Your government failed you : breaking the cycle of national security disasters
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.evpl.org/resource/Pm2khzkvNkI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.evpl.org/resource/Pm2khzkvNkI/">National security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.evpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.evpl.org/">Evansville Vanderburgh Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept National security -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.evpl.org/resource/Pm2khzkvNkI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.evpl.org/resource/Pm2khzkvNkI/">National security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.evpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.evpl.org/">Evansville Vanderburgh Public Library</a></span></span></span></span></div>