Public Data Networks: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]] | Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]] | ||
National Research Council (1999) [[Trust in Cyberspace]] | National Research Council (1999) [[Trust in Cyberspace]] | ||
Line 18: | Line 16: | ||
|- | |- | ||
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | |Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A | ||
|- | |||
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A | |||
|} | |} | ||
Revision as of 09:31, 11 August 2010
TOC-> Threats and Actors-> Security Targets-> Communications->Public Data Networks
Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism
National Research Council (1999) Trust in Cyberspace
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A |
- Subcategories: None