Communications: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Anderson, Ross J. (2008) [[Security Engineering]] | Anderson, Ross J. (2008) [[Security Engineering]] | ||
Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]] | Kramer, Franklin D., et. al (2009) [[Cyberpower and National Security]] | ||
Line 22: | Line 20: | ||
|- | |- | ||
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | |Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf ''Pdf''] | ||
|- | |||
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 10:28, 11 August 2010
TOC-> Threats and Actors-> Security Targets->Communications
Anderson, Ross J. (2008) Security Engineering
Kramer, Franklin D., et. al (2009) Cyberpower and National Security
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Research Council (1999) Trust in Cyberspace
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management |
Subcategories: