Approaches: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(39 intermediate revisions by 4 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches]]''
''[[Table of Contents | TOC->]][[Approaches]]''


Anderson, Ross (2001) [[Why Information Security is Hard]]
{{Filtered_Table||5,false}}


Anderson, Ross and Moore, Tyler (2006)  [[The Economics of Information Security]]
Anderson, Ross J. (2008) [[Security Engineering]]
Anderson, Ross, et. al (2008) [[Security Economics and the Internal Market]]
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
Beard, Jack M. (2009) [[Law and War in the Virtual Era]]
Camp, L. Jean and Lewis, Stephen (2004) [[Economics of Information Security]]
Center for Strategic and International Studies (2008) [[Securing Cyberspace for the 44th Presidency]]
Clarke, Richard A. and Knake, Robert (2010) [[Cyber War]]
Department of Defense ''(2005)'' [[Strategy for Homeland Defense and Civil Support]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]
Epstein, Richard A. and Brown, Thomas P. (2008) [[Cybersecurity in the Payment Card Industry]]
Grady, Mark F. and Parisi, Francesco (2006) [[The Law and Economics of Cybersecurity]]
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]
Johnson, Eric M. (2008) [[Managing Information Risk and the Economics of Security]]
Johnson, Vincent R. (2005) [[Cybersecurity, Identity Theft, and the Limits of Tort Liability]]
Kobayashi, Bruce H. (2006) [[An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods]]
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]]
Lernard, Thomas M. and Rubin, Paul H. (2005) [[An Economic Analysis of Notification Requirements for Data Security Breaches]]
Lernard, Thomas M. and Rubin, Paul H. (2006) [[Much Ado About Notification]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
Nye, Joseph (2010) [[Cyber Power]]
Powell, Benjamin  (2005)  [[Is Cybersecurity a Public Good]]
Romanosky et al. (2008) [[Do Data Breach Disclosure Laws Reduce Identity Theft]]
Schneier, Bruce (2003) [[Beyond Fear]]
Schneier, Bruce (2008) [[Schneier on Security]]
Schwartz, Paul and Janger, Edward (2007) [[Notification of Data Security Breaches]]
Swire, Peter P (2004) [[A Model for When Disclosure Helps Security]]
Swire, Peter P (2006) [[A Theory of Disclosure for Security and Competitive Reasons]]
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
Zittrain, Jonathan L. (2008) [[The Future of the Internet and How To Stop It]]


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Latest revision as of 15:50, 7 August 2012

TOC->Approaches

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents