Military Networks (.mil): Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 12: Line 12:


National Research Council (1999) [[Trust in Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 10:12, 11 August 2010

TOC-> Threats and Actors-> Security Targets-> Public Critical Infrastructure->Military Networks (.mil)

Anderson, Ross J. (2008) Security Engineering

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

National Research Council (1999) Trust in Cyberspace

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
  • Subcategories: None

Jump to Table of Contents