Military Networks (.mil): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]'' | ''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets | Security Targets->]][[Public Critical Infrastructure | Public Critical Infrastructure->]][[Military Networks (.mil)]]'' | ||
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]] | Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]] |
Revision as of 10:18, 11 August 2010
TOC-> Threats and Actors-> Security Targets-> Public Critical Infrastructure->Military Networks (.mil)
Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict
Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software
Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism
National Research Council (1999) Trust in Cyberspace
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A |
- Subcategories: None