Threats and Actors: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: Anderson, Ross J. (2008) Security Engineering Barkham, Jason (2001) Information Warfare and International Law on the Use of Force Clarke, Richard A. and Knake, Robert (2010) [...)
 
No edit summary
Line 42: Line 42:


Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
''[[Annotated_Bibliography | Jump to Annotated Bibliography]]''

Revision as of 13:55, 30 June 2010

Anderson, Ross J. (2008) Security Engineering

Barkham, Jason (2001) Information Warfare and International Law on the Use of Force

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Energetics Inc., (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

Nye, Joseph (2010) Cyber Power

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Rotenberg et. al. (2010) The Cyber War Threat Has Been Grossly Exaggerated

Schneier, Bruce (2003) Beyond Fear

Stohl, Michael (2006) Cyber Terrorism

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Watts, Sean (2010) Combatant Status and Computer Network Attack

Jump to Annotated Bibliography