TemplateForSources: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(26 intermediate revisions by 3 users not shown)
Line 1: Line 1:
==Full Title of Reference==
==Full Title of Reference==
The Origin of Altruism


==Full Citation==
==Full Citation==


''Bluebook Style''
''Citation should be in Bluebook Style.  For example, for an article in a journal:''


Article in Journal: John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998).  [URL_of_Article_if_Available_Online  ''Web'']
John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998).  [URL_of_Article_if_Available_Online  ''Web'']  [Alternate_URL_of_Article  ''AltWeb'']


[URL.of.Bibliography_Detailed_Entry ''BibTeX'']
[URL.to.Google_Books_Entry ''Google Books''] <- these are all optional but include if available.


[URL.to.World_Cat_Entry ''World Cat'']
[URL.to.Amazon_or_Amazon_Scholars_Entry ''Amazon'']


==Categorization==
==Categorization==
* Resource by Type: [[Journal Article]]
* Threats and Actors: [[States]]
* Issues: [[Cyberwar]]
* Approaches: [[International Law (including Laws of War)]]


Issues: [[Cyberwar]]
''If there is more than one category for heading, separate by comma.''


==Key Words==  
==Key Words==  


''See the article itself for any key words as a starting point''
''If available, copy keywords from journal listing of related terms, separated by comma.''
 
Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws


==Synopsis==
==Synopsis==


This book explains how we all can think sensibly about security. In today's uncertain world, security is too important to be left to others. Drawing from his experience advising world business and political leaders, Schneier demonstrates the practical -- and surprisingly simple -- steps we can all take to address the real threats faced by our families, our communities, and our nation.
''The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions. The goal should be to include what would be included  in an Executive Summary. You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.''
 
Security is not mysterious, Bruce Schneier tells us, and contrary to popular belief, it is not hard. What is hard is separating the hype from what really matters. You already make security choices every day of your life, from what side of the street you walk on to whether you park your car under a streetlight. You do it naturally. This book guides you, step by step, through the process of making all your security choices just as natural.
 
Schneier invites us all to move beyond fear and to start thinking sensibly about security. He tells us why security is much more than cameras, guards, and photo IDs, and why expensive gadgets and technological cure-alls often obscure the real security issues. Using anecdotes from history, science, sports, movies, and the evening news, Beyond Fear explains basic rules of thought and action that anyone can understand and, most important of all, anyone can use.


==Additional Notes and Highlights==
==Additional Notes and Highlights==


'' * Outline key points of interest
''Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.''

Latest revision as of 15:47, 6 August 2012

Full Title of Reference

The Origin of Altruism

Full Citation

Citation should be in Bluebook Style. For example, for an article in a journal:

John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]

[URL.to.Google_Books_Entry Google Books] <- these are all optional but include if available.

[URL.to.World_Cat_Entry World Cat]

[URL.to.Amazon_or_Amazon_Scholars_Entry Amazon]

Categorization

If there is more than one category for heading, separate by comma.

Key Words

If available, copy keywords from journal listing of related terms, separated by comma.

Computer Crimes -- Military Aspects, Regulations And Rules, War (International law) -- Laws

Synopsis

The purpose of the synopsis is to give the reader not only the subject matter of the reference but also the authors' conclusions. The goal should be to include what would be included in an Executive Summary. You can copy relevant paragraphs (enclose into format), or summarize or reprint an provided executive summary.

Additional Notes and Highlights

Outline key points of interest or other information that does not fit in one of the topics above including links to reviews, citations of the reference, online discussions, Table of Contents, sample chapters if the full reference is not available online.