Identity Management: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]] | Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 16: | Line 14: | ||
|- | |- | ||
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | |Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | ||
|- | |||
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 11:05, 11 August 2010
TOC-> Issues->Identity Management
Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None