Identity Management: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:


Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
White House (2009) [[Cyberspace Policy Review]]


{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 16: Line 14:
|-
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
|}
|}



Revision as of 11:05, 11 August 2010

TOC-> Issues->Identity Management

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Author 1 Author 2 Year Title Source Expertise Full Text
Schneier, Bruce 2003 Beyond Fear Book None Scribd
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents