Technology: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Technology]]'' | ''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Technology]]'' | ||
Anderson, Ross | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
Gandal, Neil | ! style="background-color: #efefef;" | Author 1 | ||
! style="background-color: #efefef;" | Author 2 | |||
Moore, Tyler | ! style="background-color: #efefef;" | Year | ||
! style="background-color: #efefef;" | Title | |||
Moore, Tyler | ! style="background-color: #efefef;" | Source | ||
! style="background-color: #efefef;" | Expertise | |||
National Cyber Defense Initiative | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
National Institute of Standards and Technology | | Anderson, Ross || Moore, Tyler ||2006||[[The Economics of Information Security]]|| || || | ||
|- | |||
National Cyber Security Summit Task Force | | Gandal, Neil || ||2008||[[An Introduction to Key Themes in the Economics of Cyber Security]]|| || || | ||
|- | |||
National Infrastructure Advisory Council | | Moore, Tyler || Clayton, Richard ||2007||[[Examining the Impact of Website Take-down on Phishing]]|| || || | ||
|- | |||
| Moore, Tyler || Clayton, Richard ||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]|| || || | |||
|- | |||
| National Cyber Defense Initiative || ||2009||[[National Cyber Defense Financial Services Workshop Report]]|| || || | |||
|- | |||
| National Institute of Standards and Technology || ||2006||[[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]|| || || | |||
|- | |||
| National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]|| || || | |||
|- | |||
| National Infrastructure Advisory Council ||2004||[[Hardening The Internet]]|| || || | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents| Jump to Table of Contents]]'' | ''[[Table of Contents| Jump to Table of Contents]]'' |
Revision as of 11:01, 10 August 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross | Moore, Tyler | 2006 | The Economics of Information Security | |||
Gandal, Neil | 2008 | An Introduction to Key Themes in the Economics of Cyber Security | ||||
Moore, Tyler | Clayton, Richard | 2007 | Examining the Impact of Website Take-down on Phishing | |||
Moore, Tyler | Clayton, Richard | 2008 | The Consequence of Non-Cooperation in the Fight Against Phishing | |||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | ||||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | ||||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | ||||
National Infrastructure Advisory Council | 2004 | Hardening The Internet |
- Subcategories: None