Deterrence: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Deterrence]]'' | ''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[Deterrence]]'' | ||
Anderson, Ross, et. al | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
Johnson, Eric M. | ! style="background-color: #efefef;" | Author 1 | ||
! style="background-color: #efefef;" | Author 2 | |||
Kobayashi, Bruce H. | ! style="background-color: #efefef;" | Year | ||
! style="background-color: #efefef;" | Title | |||
Korns, Stephen W. | ! style="background-color: #efefef;" | Source | ||
! style="background-color: #efefef;" | Expertise | |||
National Cyber Defense Initiative | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
National Cyber Security Summit Task Force | | Anderson, Ross, et. al || ||2008||[[Security Economics and the Internal Market]]|| ||None|| | ||
|- | |||
National Research Council | | Johnson, Eric M. || ||2008||[[Managing Information Risk and the Economics of Security]]|| ||None|| | ||
|- | |||
Schneier, Bruce | | Kobayashi, Bruce H. || ||2006||[[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]|| ||None|| | ||
|- | |||
Sklerov, Matthew J. | | Korns, Stephen W. || ||2009||[[Cyber Operations]]|| ||None|| | ||
|- | |||
Todd, Graham H. | | National Cyber Defense Initiative || ||2009||[[National Cyber Defense Financial Services Workshop Report]]|| ||None|| | ||
|- | |||
Watts, Sean | | National Cyber Security Summit Task Force || ||2004||[[Information Security Governance]]|| ||None|| | ||
|- | |||
| National Research Council || ||2007||[[Toward a Safer and More Secure Cyberspace]]|| ||None|| | |||
|- | |||
| Schneier, Bruce || ||2003||[[Beyond Fear]]|| ||None|| | |||
|- | |||
| Sklerov, Matthew J. || ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]|| ||None|| | |||
|- | |||
| Todd, Graham H. || ||2009||[[Armed Attack in Cyberspace]]|| ||None|| | |||
|- | |||
| Watts, Sean || ||2010||[[Combatant Status and Computer Network Attack]]|| ||None|| | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents | Jump to Table of Contents]]'' | ''[[Table of Contents | Jump to Table of Contents]]'' |
Revision as of 11:31, 10 August 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross, et. al | 2008 | Security Economics and the Internal Market | None | |||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | None | |||
Kobayashi, Bruce H. | 2006 | An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods | None | |||
Korns, Stephen W. | 2009 | Cyber Operations | None | |||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | None | |||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | None | |||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | None | |||
Schneier, Bruce | 2003 | Beyond Fear | None | |||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | None | |||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | None | |||
Watts, Sean | 2010 | Combatant Status and Computer Network Attack | None |
- Subcategories: None