Espionage: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 18: Line 18:


Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|}


*''[[Espionage | Espionage->]][[Government to Government]]''
*''[[Espionage | Espionage->]][[Government to Government]]''

Revision as of 09:13, 11 August 2010

TOC-> Issues->Espionage

Anderson, Ross J. (2008) Security Engineering

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Nye, Joseph (2010) Cyber Power

Todd, Graham H. (2009) Armed Attack in Cyberspace

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A

Jump to Table of Contents