Books: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(30 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Books]]'' | |||
Schneier, Bruce '' | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
! style="background-color: #efefef;" | Author 1 | |||
! style="background-color: #efefef;" | Author 2 | |||
! style="background-color: #efefef;" | Year | |||
! style="background-color: #efefef;" | Title | |||
! style="background-color: #efefef;" | Source | |||
! style="background-color: #efefef;" | Expertise | |||
! style="background-color: #efefef;" class="unsortable" | Full Text | |||
|- | |||
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | |||
|- | |||
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | |||
|- | |||
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A | |||
|- | |||
|Grady, Mark F.||Parisi, Francesco||2006||[[The Law and Economics of Cybersecurity]]||Book||Low:Economics; Low:Law||N/A | |||
|- | |||
|Johnson, Eric M.||||2008||[[Managing Information Risk and the Economics of Security]]||Book||High:Economics||N/A | |||
|- | |||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |||
|- | |||
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | |||
|- | |||
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase''] | |||
|- | |||
|Zittrain, Jonathan L.||||2008||[[The Future of the Internet and How To Stop It]]||Book||None||[http://futureoftheinternet.org/static/ZittrainTheFutureoftheInternet.pdf ''Pdf''] | |||
|} | |||
*'''''Subcategories:''''' ''None'' | |||
''[[Table of Contents | Jump to Table of Contents]]'' |
Latest revision as of 13:42, 10 August 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
- Subcategories: None