Cybercrime: Difference between revisions
No edit summary |
No edit summary |
||
Line 35: | Line 35: | ||
Trend Micro Incorporated (2010) [[Trend Micro Annual Report]] | Trend Micro Incorporated (2010) [[Trend Micro Annual Report]] | ||
'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents| Jump to Table of Contents]]'' | ''[[Table of Contents| Jump to Table of Contents]]'' |
Revision as of 11:33, 21 July 2010
Anderson, Ross, et. al (2008) Security Economics and the Internal Market
Anderson, Ross J. (2008) Security Engineering
Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism
Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security
McAfee, Inc. (2010) McAfee Threats Report
Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing
Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down
Kramer, Franklin D., et. al (2009) Cyberpower and National Security
Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing
Moore, Tyler, et. al (2009) The Economics of Online Crime
National Research Council (2007) Toward a Safer and More Secure Cyberspace
Symantec Corporation (2010) Symantec Global Internet Security Threat Report
Thomas, Rob and Martin, Jerry (2006) The Underground Economy
Todd, Graham H. (2009) Armed Attack in Cyberspace
Trend Micro Incorporated (2010) Trend Micro Annual Report
- Subcategories: None