Security Targets: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(28 intermediate revisions by 4 users not shown)
Line 1: Line 1:
Anderson, Ross J. (2008) [[Security Engineering]]
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Security Targets]]''


Clarke, Richard A. and Knake, Robert  (2010)  [[Cyber War]]
{{Filtered_Table||3.3,false}}


Department of Defense ''(2005)'' [[Strategy for Homeland Defense and Civil Support]]


Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
''[[Table of Contents | Jump to Table of Contents]]''
 
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
 
Energetics Inc., ''(2006)'' [[Roadmap to Secure Control Systems in the Energy Sector]]
 
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
 
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
 
Moore, Tyler and Clayton, Richard  (2007) [[Examining the Impact of Website Take-down on Phishing]]
 
Moore, Tyler and Clayton, Richard  (2008) [[The Consequence of Non-Cooperation in the Fight Against Phishing]]
 
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
 
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
 
Schneier, Bruce (2003) [[Beyond Fear]]
 
Thomas, Rob and Martin, Jerry (2006) [[The Underground Economy]]

Latest revision as of 16:34, 7 August 2012

TOC-> Threats and Actors->Security Targets

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents