Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
| align="center" style="background:#f0f0f0;"|'''Category''' | | align="center" style="background:#f0f0f0;"|'''Category''' | ||
|- | |- | ||
| Centre for Secure Information Technologies||2012||[http://www. | | McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"]|||| | ||
| | |- | ||
| | | Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]|||| | ||
| | | Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "World Cybersecurity Technology Research Summit (Belfast 2011) "]|||| | ||
|- | |||
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "]|||| | |||
|- | |||
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 "America’s Cyber Future: Security and Prosperity in the Information Age "]|||| | |||
| ||1899-12-30||[-- ""]|||| | |||
|- | |||
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report "Resilience of the Internet Interconnection Ecosystem, at: "]|||| | |||
|- | |||
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "]|||| | |||
|- | |||
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf "Cybersecurity Two Years Later "]|||| | |||
|- | |||
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "]|||| | |||
|- | |||
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National Security Threats in Cyberspace FINAL 09-15-09.pdf "National Security Threats in Cyberspace "]|||| | |||
|- | |||
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report || | |||
|- | |||
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "]||Government Report || | |||
|} | |||
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> | <includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly> |
Revision as of 15:07, 8 June 2012
Filtering for category: All Categories