Telephone: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
National Research Council (1999) [[Trust in Cyberspace]] | National Research Council (1999) [[Trust in Cyberspace]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | |||
|- | |||
! style="background-color: #efefef;" | Author 1 | |||
! style="background-color: #efefef;" | Author 2 | |||
! style="background-color: #efefef;" | Year | |||
! style="background-color: #efefef;" | Title | |||
! style="background-color: #efefef;" | Source | |||
! style="background-color: #efefef;" | Expertise | |||
! style="background-color: #efefef;" class="unsortable" | Full Text | |||
|- | |||
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents| Jump to Table of Contents]]'' | ''[[Table of Contents| Jump to Table of Contents]]'' |
Revision as of 09:13, 11 August 2010
TOC-> Threats and Actors-> Security Targets-> Communications->Telephone
Anderson, Ross J. (2008) Security Engineering
Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism
National Research Council (1999) Trust in Cyberspace
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A |
- Subcategories: None