Template:Filtered Table: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 8: Line 8:
| align="center" style="background:#f0f0f0;"|'''Category'''
| align="center" style="background:#f0f0f0;"|'''Category'''
|-
|-
| Centre for Secure Information Technologies||2012||[http://www.google.com "Google"]||Government Report||Test1<br />Test2
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"]||||
|<noinclude>-
|-
| Business Roundtable||2012||[http://www.cyber.st.dhs.gov/docs/Information%20Security%20Governance-%20A%20Call%20to%20Action%20(2004).pdf "PDF"]||Government Report||Test1<br />Test3
| Business Roundtable||2012-10-11||[http://businessroundtable.org/uploads/studies-reports/downloads/2011_10_Mission_Critical_A_Public-Private_Strategy_for_Effective_Cybersecurity.pdf "Mission Critical: A Public-Private Strategy for Effective Cybersecurity "]||||
|</noinclude>}
| Centre for Secure Information Technologies||2012-09-11||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "World Cybersecurity Technology Research Summit (Belfast 2011) "]||||
 
|-
| National Security Cyberspace Institute||2012-07-11||[http://www.nsci-va.org/WhitePapers/2011-07-22-Cyber Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "]||||
|-
| Center for a New American Security||2012-06-11||[http://www.cnas.org/node/6405 "America’s Cyber Future: Security and Prosperity in the Information Age "]||||
| ||1899-12-30||[-- ""]||||
|-
| European Network and Information Security Agency (ENISA) ||2011-04-11||[http://www.enisa.europa.eu/act/res/other-areas/inter-x/report/interx-report "Resilience of the Internet Interconnection Ecosystem, at: "]||||
|-
| Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America ||2011-03-08||[http://www.cdt.org/files/pdfs/20110308_cbyersec_paper.pdf "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "]||||
|-
| CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies ||2011-01||[http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf "Cybersecurity Two Years Later "]||||
|-
| National Research Council ||2010-09-21||[http://www.nap.edu/catalog.php?record_id=12998 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "]||||
|-
| Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum ||2009-09-15||[http://nationalstrategy.com/Portals/0/National Security Threats in Cyberspace FINAL 09-15-09.pdf  "National Security Threats in Cyberspace "]||||
|-
| GAO||2012-02-28||[http://www.csit.qub.ac.uk/media/pdf/Filetoupload,252359,en.pdf "Cybersecurity: Challenges to Securing the Modernized Electricity Grid "]||Government Report ||
|-
| GAO||2011-12-09||[http://www.gao.gov/products/GAO-12-92 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use "]||Government Report ||
|}
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>
<includeonly>[[Template:Filtered Table|Filtered Table Template]]</includeonly>

Revision as of 15:07, 8 June 2012

Filtering for category: All Categories

Author/Agency Date Title Type Category
McAfee and the Security Defense Agenda 2012-02-12 "Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World"
Business Roundtable 2012-10-11 "Mission Critical: A Public-Private Strategy for Effective Cybersecurity " Centre for Secure Information Technologies 2012-09-11 "World Cybersecurity Technology Research Summit (Belfast 2011) "
National Security Cyberspace Institute 2012-07-11 Analogies Whitepaper-K McKee.pdf "A Review of Frequently Used Cyber Analogies "
Center for a New American Security 2012-06-11 "America’s Cyber Future: Security and Prosperity in the Information Age " 1899-12-30 [-- ""]
European Network and Information Security Agency (ENISA) 2011-04-11 "Resilience of the Internet Interconnection Ecosystem, at: "
Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America 2011-03-08 "Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper "
CSIS Commission on Cybersecurity for the 44th Presidency, Center for Strategic and International Studies 2011-01 "Cybersecurity Two Years Later "
National Research Council 2010-09-21 "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop "
Joint Workshop of the National Security Threats in Cyberspace and the National Strategy Forum 2009-09-15 Security Threats in Cyberspace FINAL 09-15-09.pdf "National Security Threats in Cyberspace "
GAO 2012-02-28 "Cybersecurity: Challenges to Securing the Modernized Electricity Grid " Government Report
GAO 2011-12-09 "Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use " Government Report