Sort Test Page: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(39 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Books]]'' | ''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Books]]'' | ||
{| class="wikitable sortable" border="1" cellpadding=" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |- | ||
! Author | ! style="background-color: #efefef;" | Author 1 | ||
! style="background-color: #efefef;" | Author 2 | |||
! style="background-color: #efefef;" | Year | |||
! style="background-color: #efefef;" | Title | |||
! style="background-color: #efefef;" | Source | |||
! style="background-color: #efefef;" | Expertise | |||
|- | |- | ||
| Anderson, Ross J. || 2008 || [[Security Engineering]] | | Anderson, Ross J. || || 2008 || [[Security Engineering]] || Book || Technology:Low; Cryptography:Low | ||
|- | |- | ||
| Camp, L. Jean | | Camp, L. Jean || Lewis, Stephen || 2004 || [[Economics of Information Security]] || Book || Economics:High | ||
|- | |- | ||
| Clarke, Richard A. | | Clarke, Richard A. || Knake, Robert || 2010 || [[Cyber War]] || Book || None | ||
|- | |- | ||
| Grady, Mark F. | | Grady, Mark F. || Parisi, Francesco || 2006 || [[The Law and Economics of Cybersecurity]] || Book || Economics:Low; Law:Low | ||
|- | |- | ||
| Johnson, Eric M. || 2008 || [[Managing Information Risk and the Economics of Security]] | | Johnson, Eric M. || || 2008 || [[Managing Information Risk and the Economics of Security]] || Book || Economics:High | ||
|- | |- | ||
| Kramer, Franklin D., et. al || 2009 || [[Cyberpower and National Security]] | | Kramer, Franklin D., et. al || || 2009 || [[Cyberpower and National Security]] || Book || None | ||
|- | |- | ||
| Schneier, Bruce || 2003 || [[Beyond Fear]] | | Schneier, Bruce || || 2003 || [[Beyond Fear]] || Book || None | ||
|- | |- | ||
| Schneier, Bruce || 2008 || [[Schneier on Security]] | | Schneier, Bruce || || 2008 || [[Schneier on Security]] || Book || None | ||
|- | |- | ||
| Zittrain, Jonathan L. || 2008 || [[The Future of the Internet and How To Stop It]] | | Zittrain, Jonathan L. || || 2008 || [[The Future of the Internet and How To Stop It]] || Book || None | ||
|} | |} | ||
Latest revision as of 13:48, 28 July 2010
Author 1 | Author 2 | Year | Title | Source | Expertise |
---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Technology:Low; Cryptography:Low | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | Economics:High |
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Economics:Low; Law:Low |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | Economics:High | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | |
Schneier, Bruce | 2003 | Beyond Fear | Book | None | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | |
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None