Sort Test Page: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
{| class="sortable" border="1" cellpadding="2" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="sortable" border="1" cellpadding="2" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |- | ||
! Author(s) !! Year !! Title !! Source !! Expertise | ! Author(s) !! Year !! Title !! Source !! Expertise style="background-color: #efefef;" | ||
|- | |- | ||
| Anderson, Ross J. || 2008 || [[Security Engineering]] || Book || Technology:Low | | Anderson, Ross J. || 2008 || [[Security Engineering]] || Book || Technology:Low |
Revision as of 11:31, 27 July 2010
Author(s) | Year | Title | Source | Expertise style="background-color: #efefef;" |
---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Technology:Low |
Camp, L. Jean and Lewis, Stephen | 2004 | Economics of Information Security | Book | Economics:High |
Clarke, Richard A. and Knake, Robert | 2010 | Cyber War | Book | None |
Grady, Mark F. and Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Economics:Low; Law:Low |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | Economics:High |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None |
Schneier, Bruce | 2003 | Beyond Fear | Book | None |
Schneier, Bruce | 2008 | Schneier on Security | Book | None |
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None