Sort Test Page: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Books]]'' | ''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Books]]'' | ||
{| class="sortable" border="1" cellpadding="2" cellspacing="0" style="border: 1px solid lightgray | {| class="sortable" border="1" cellpadding="2" cellspacing="0" style="border: 1px solid lightgray;" | ||
|- | |- | ||
! Author(s) !! Year !! Title !! Expertise | ! Author(s) !! Year !! Title !! Expertise | ||
Revision as of 15:13, 27 July 2010
| Author(s) | Year | Title | Expertise |
|---|---|---|---|
| Anderson, Ross J. | 2008 | Security Engineering | Low:Technology |
| Camp, L. Jean and Lewis, Stephen | 2004 | Economics of Information Security | High:Economics |
| Clarke, Richard A. and Knake, Robert | 2010 | Cyber War | None |
| Grady, Mark F. and Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Low:Economics; Low:Law |
| Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | High:Economics |
| Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | None |
| Schneier, Bruce | 2003 | Beyond Fear | None |
| Schneier, Bruce | 2008 | Schneier on Security | None |
| Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | None |
- Subcategories: None