International Cooperation: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Cooperation]]''
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Cooperation]]''
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 11: Line 9:
! style="background-color: #efefef;" | Source  
! style="background-color: #efefef;" | Source  
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text
! style="background-color: #efefef;" class="unsortable" | Full Text  
|-
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||None||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf'']
|-
|-
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']

Revision as of 12:26, 11 August 2010

TOC-> Approaches->International Cooperation

Author 1 Author 2 Year Title Source Expertise Full Text
Barkham, Jason 2001 Information Warfare and International Law on the Use of Force Law Review None Pdf Alt Pdf
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Clarke, Richard A. Knake, Robert 2010 Cyber War Book None N/A
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
Moore, Tyler Clayton, Richard 2009 The Impact of Incentives on Notice and Take-down Book Chapter Moderate:Technology; Low:Law Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents