Public Critical Infrastructure: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 4: Line 4:


Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
Department of Commerce (2010) [[Defense Industrial Base Assessment]]


Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
Line 20: Line 18:


National Research Council (1999) [[Trust in Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
|}


'''''Subcategories:'''''
'''''Subcategories:'''''

Revision as of 10:46, 11 August 2010