Independent Reports: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Independent Reports]]'' | ''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Independent Reports]]'' | ||
Center for Strategic and International Studies | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
National Research Council | ! style="background-color: #efefef;" | Author/Agency | ||
! style="background-color: #efefef;" | Year | |||
National Research Council | ! style="background-color: #efefef;" | Title | ||
! style="background-color: #efefef;" | Source | |||
Computing Research Association | ! style="background-color: #efefef;" | Expertise | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | |||
Energetics Inc. | |- | ||
| Center for Strategic and International Studies ||2008|| [[Securing Cyberspace for the 44th Presidency]] ||Independent Reports||None|| [ ''Pdf''] | |||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | |- | ||
| National Research Council ||2007|| [[Toward a Safer and More Secure Cyberspace]] ||Independent Reports||None|| [ ''Pdf''] | |||
Institute for Information Infrastructure Protection | |- | ||
| National Research Council ||1999|| [[Trust in Cyberspace]] ||Independent Reports||None|| [ ''Pdf''] | |||
|- | |||
| Computing Research Association ||2003|| [[Four Grand Challenges in Trustworthy Computing]] ||Independent Reports||None|| [ ''Pdf''] | |||
|- | |||
| Energetics Inc. ||2006|| [[Roadmap to Secure Control Systems in the Energy Sector]] ||Independent Reports||None|| [ ''Pdf''] | |||
|- | |||
| Financial Services Sector Coordinating Council for Critical Infrastructure Protection ||2008|| [[Research Agenda for the Banking and Finance Sector]] ||Independent Reports||None|| [ ''Pdf''] | |||
|- | |||
| Institute for Information Infrastructure Protection ||2003|| [[Cyber Security Research and Development Agenda]] ||Independent Reports||None|| [ ''Pdf''] | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents | Jump to Table of Contents]]'' | ''[[Table of Contents | Jump to Table of Contents]]'' |
Revision as of 16:11, 9 August 2010
TOC-> Resource by Type->Independent Reports
Author/Agency | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | None | [ Pdf] |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | None | [ Pdf] |
National Research Council | 1999 | Trust in Cyberspace | Independent Reports | None | [ Pdf] |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | [ Pdf] |
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Reports | None | [ Pdf] |
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Reports | None | [ Pdf] |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | None | [ Pdf] |
- Subcategories: None