Cyberwar: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(21 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Cyberwar]]''
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Cyberwar]]''


Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]
{{Filtered_Table||4.12,false}}


Beard, Jack M. (2009) [[Law and War in the Virtual Era]]


Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]
''[[Table of Contents | Jump to Table of Contents]]''
 
Dörmann, Knut  (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
 
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]
 
Korns, Stephen W.  (2009) [[Cyber Operations]]
 
Nye, Joseph (2010) [[Cyber Power]]
 
Rotenberg et. al ''(2010)'' [[The Cyber War Threat Has Been Grossly Exaggerated]]
 
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]]
 
Schmitt, Michael N. (2002) [[Wired Warfare]]
 
Schmitt, Michael N., et. al (2004) [[Computers and War]]
 
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]
 
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]
 
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|-
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
|-
|Department of Defense||||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf'']
|-
|Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf  ''Pdf'']
|-
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|}
 
'''''Subcategories:''''' ''None''
 
''[[Annotated_Bibliography | Jump to Annotated Bibliography]]''

Latest revision as of 16:47, 7 August 2012

TOC-> Issues->Cyberwar

Types
U.S. Government Report
U.S. Government Hearing
Non-U.S. Government Report
Independent Report
Industry Report
Book
Journal Article
Article
Categories
Exclude Subcatgeories
Search
Help


Jump to Table of Contents