International Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Cooperation]]'' | ''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Cooperation]]'' | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 11: | Line 9: | ||
! style="background-color: #efefef;" | Source | ! style="background-color: #efefef;" | Source | ||
! style="background-color: #efefef;" | Expertise | ! style="background-color: #efefef;" | Expertise | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||None||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf''] | |||
|- | |- | ||
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | |Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] |
Revision as of 12:26, 11 August 2010
TOC-> Approaches->International Cooperation
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Barkham, Jason | 2001 | Information Warfare and International Law on the Use of Force | Law Review | None | Pdf Alt Pdf | |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None