TrialMainPage: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
Line 13: Line 13:


==Introduction==
==Introduction==
This Cybersecurity wiki provides a set of evolving resources on [[Cybersecurity_Overview|cybersecurity, broadly defined]], and includes an '''[[Cybersecurity_Annotated_Bibliography|annotated list]]''' of relevant articles and literature, which can be searched in a number of ways. Please [[#Navigation|see below]].
This Cybersecurity wiki provides a set of evolving resources on [[Cybersecurity_Overview|cybersecurity, broadly defined]], and includes an '''[[Cybersecurity_Annotated_Bibliography|annotated list]]''' of relevant articles and literature, which can be searched in a number of ways. Please [[#Navigation|see below]]. It is intended as a tool/resource for researchers, technologists, students, policy-makers and others who are interested in cybersecurity issues more broadly. For more information about this first phase of the project, including the team, methodology, and opportunities to contribute, please see [[About|About the Project]].
 
It is intended as a tool/resource for researchers, technologists, students, policy-makers and others who are interested in cybersecurity issues more broadly. For more information about this first phase of the project, including the team, methodology, and opportunities to contribute, please see [[About|About the Project]].


If you have feedback, comments, or suggested additional readings/resources, please contact: [mailto:cybersecurity-feedback@cyber.law.harvard.edu cybersecurity-feedback@cyber.law.harvard.edu].<br>
If you have feedback, comments, or suggested additional readings/resources, please contact: [mailto:cybersecurity-feedback@cyber.law.harvard.edu cybersecurity-feedback@cyber.law.harvard.edu].<br>

Revision as of 17:51, 7 August 2012

This page is for trying out ideas for the main page of the wiki.


Navigation
Toc icon.svg
Table of Contents
All articles3.svg
List of All Articles
Case studies.svg
Case Studies
H2o icon.svg
Suggested Syllabi (H2O)
Help icon4.svg
How to Use this Wiki

Introduction

This Cybersecurity wiki provides a set of evolving resources on cybersecurity, broadly defined, and includes an annotated list of relevant articles and literature, which can be searched in a number of ways. Please see below. It is intended as a tool/resource for researchers, technologists, students, policy-makers and others who are interested in cybersecurity issues more broadly. For more information about this first phase of the project, including the team, methodology, and opportunities to contribute, please see About the Project.

If you have feedback, comments, or suggested additional readings/resources, please contact: cybersecurity-feedback@cyber.law.harvard.edu.

Prior to suggesting material for inclusion in the wiki, please consult the Submitting Feedback page.

Navigation

Table of Contents

The quickest way to get started is by using the Table of Contents as a guide to searching articles by type or category. Some of the articles have wiki entries whcih include a synopsis, full bibliographic information, and additional relevant notes.

List of All Articles

You might also wish to consult the list of all articles and use the filtering tool to receive customized search results by type, category, or a free text search term.

Case Studies

The Case Studies page presents a list of selected case studies with short summaries and links to related literature such as news articles and investigative reports.

Selected Syllabi (H2O)

The Suggested Syllabi section uses the H2O platform to feature a selection of playlists for instruction.

How to Use this Wiki

For a full explanation of how to browse the wiki, please consult the Help page.