Template:Filtered Table: Difference between revisions
Jump to navigation
Jump to search
Help
No edit summary |
No edit summary |
||
Line 273: | Line 273: | ||
| McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ]||No||Industry Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]] | | McAfee ||2012-02-01||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf?cid=WBB048 Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World ]||No||Industry Report||3. [[Threats and Actors]],<br>4. [[Issues]],<br>5. [[Approaches]] | ||
|- | |- | ||
| Business Software Alliance ||2012-02-02|| | | Business Software Alliance ||2012-02-02||Global Cloud Computing Scorecard a Blueprint for Economic Opportunity||No||Industry Report||3.3.3.3 [[Cloud Computing]] | ||
|- | |- | ||
| McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World]||No||Industry Report||1. [[Overview]],<br>4. [[Issues]],<br>5. [[Approaches]] | | McAfee and the Security Defense Agenda||2012-02-12||[http://www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf Cyber-security: The Vexed Question of Global Rules: An Independent Report on Cyber-Preparedness Around the World]||No||Industry Report||1. [[Overview]],<br>4. [[Issues]],<br>5. [[Approaches]] |
Revision as of 15:30, 3 August 2012
Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search