International Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
Schmitt, Michael N. (2002) [[Wired Warfare]] | Schmitt, Michael N. (2002) [[Wired Warfare]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 26: | Line 24: | ||
|- | |- | ||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | ||
|- | |||
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 11:06, 11 August 2010
TOC-> Approaches->International Cooperation
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Schmitt, Michael N. (2002) Wired Warfare
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None