Four Grand Challenges in Trustworthy Computing: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
==Full Citation== | ==Full Citation== | ||
National Cyber Security Summit Task Force | National Cyber Security Summit Task Force : Information Security Governance. A Call to Action. (2004). [http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CRA:2003&f=wikibiblio.bib BibTeX] |
Revision as of 14:09, 17 June 2010
Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering
Full Citation
National Cyber Security Summit Task Force : Information Security Governance. A Call to Action. (2004). Web
Categorization
Overview: Government Reports