Government Reports and Documents: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents]]'' | ''[[Table of Contents | TOC->]][[Resource by Type | Resource by Type->]][[Government Reports and Documents]]'' | ||
Department of Commerce (2010) [[Defense Industrial Base Assessment]] | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]] | ! style="background-color: #efefef;" | Author 1 | ||
! style="background-color: #efefef;" | Author 2 | |||
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]] | ! style="background-color: #efefef;" | Year | ||
! style="background-color: #efefef;" | Title | |||
Department of Homeland Security (2009) [[A Roadmap for Cybersecurity Research]] | ! style="background-color: #efefef;" | Source | ||
! style="background-color: #efefef;" | Expertise | |||
Department of Homeland Security (2003) [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
Deputy Chief of Staff for Intelligence (2006) [[Critical Infrastructure Threats and Terrorism]] | | Department of Commerce || || (2010) || [[Defense Industrial Base Assessment]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
INFOSEC Research Council (2005) [[Hard Problem List]] | | Department of Defense || || (2007) || [[Mission Impact of Foreign Influence on DoD Software]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
National Cyber Defense Initiative (2009) [[National Cyber Defense Financial Services Workshop Report]] | | Department of Defense || || (2005) || [[Strategy for Homeland Defense and Civil Support]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
National Cyber Security Summit Task Force (2004) [[Information Security Governance]] | | Department of Homeland Security || || (2009) || [[A Roadmap for Cybersecurity Research]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
National Infrastructure Advisory Council (2004) [[Hardening The Internet]] | | Department of Homeland Security || || (2003) || [[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
National Institute of Standards and Technology (2006) [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] | | Deputy Chief of Staff for Intelligence || || (2006) || [[Critical Infrastructure Threats and Terrorism]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]] | | INFOSEC Research Council || || (2005) || [[Hard Problem List]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
Networking and Information Technology Research and Development ''(2009)'' [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] | | National Cyber Defense Initiative || || (2009) || [[National Cyber Defense Financial Services Workshop Report]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
President's Commission on Critical Infrastructure Protection ''(1997)'' [[Critical Foundations]] | | National Cyber Security Summit Task Force || || (2004) || [[Information Security Governance]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
President's Information Technology Advisory Council ''(2005)'' [[Cyber Security: A Crisis of Prioritization]] | | National Infrastructure Advisory Council || || (2004) || [[Hardening The Internet]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
United States Secret Service ''(2004)'' [[Insider Threat Study]] | | National Institute of Standards and Technology || || (2006) || [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
White House ''(2003)'' [[The National Strategy to Secure Cyberspace]] | | National Science and Technology Council || || ''(2006)'' || [[Federal Plan for Cyber Security and Information Assurance Research and Development]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
White House ''(2009)'' [[Cyberspace Policy Review]] | | Networking and Information Technology Research and Development || || ''(2009)'' || [[National Cyber Leap Year Summit 2009, Co-Chairs' Report]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
White House ''(2010)'' [[The Comprehensive National Cybersecurity Initiative]] | | President's Commission on Critical Infrastructure Protection || || ''(1997)'' || [[Critical Foundations]] || Government Report || None || [http:// ''Pdf''] | ||
|- | |||
| President's Information Technology Advisory Council || || ''(2005)'' || [[Cyber Security: A Crisis of Prioritization]] || Government Report || None || [http:// ''Pdf''] | |||
|- | |||
| United States Secret Service || || ''(2004)'' || [[Insider Threat Study]] || Government Report || None || [http:// ''Pdf''] | |||
|- | |||
| White House || || ''(2003)'' || [[The National Strategy to Secure Cyberspace]] || Government Report || None || [http:// ''Pdf''] | |||
|- | |||
| White House || || ''(2009)'' || [[Cyberspace Policy Review]] || Government Report || None || [http:// ''Pdf''] | |||
|- | |||
| White House || || ''(2010)'' || [[The Comprehensive National Cybersecurity Initiative]] || Government Report || None || [http:// ''Pdf'']ne | |||
|} | |||
'''''Subcategories:''''' | '''''Subcategories:''''' |
Revision as of 14:19, 9 August 2010
TOC-> Resource by Type->Government Reports and Documents
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Department of Commerce | (2010) | Defense Industrial Base Assessment | Government Report | None | [http:// Pdf] | |
Department of Defense | (2007) | Mission Impact of Foreign Influence on DoD Software | Government Report | None | [http:// Pdf] | |
Department of Defense | (2005) | Strategy for Homeland Defense and Civil Support | Government Report | None | [http:// Pdf] | |
Department of Homeland Security | (2009) | A Roadmap for Cybersecurity Research | Government Report | None | [http:// Pdf] | |
Department of Homeland Security | (2003) | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | [http:// Pdf] | |
Deputy Chief of Staff for Intelligence | (2006) | Critical Infrastructure Threats and Terrorism | Government Report | None | [http:// Pdf] | |
INFOSEC Research Council | (2005) | Hard Problem List | Government Report | None | [http:// Pdf] | |
National Cyber Defense Initiative | (2009) | National Cyber Defense Financial Services Workshop Report | Government Report | None | [http:// Pdf] | |
National Cyber Security Summit Task Force | (2004) | Information Security Governance | Government Report | None | [http:// Pdf] | |
National Infrastructure Advisory Council | (2004) | Hardening The Internet | Government Report | None | [http:// Pdf] | |
National Institute of Standards and Technology | (2006) | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | None | [http:// Pdf] | |
National Science and Technology Council | (2006) | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | None | [http:// Pdf] | |
Networking and Information Technology Research and Development | (2009) | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | None | [http:// Pdf] | |
President's Commission on Critical Infrastructure Protection | (1997) | Critical Foundations | Government Report | None | [http:// Pdf] | |
President's Information Technology Advisory Council | (2005) | Cyber Security: A Crisis of Prioritization | Government Report | None | [http:// Pdf] | |
United States Secret Service | (2004) | Insider Threat Study | Government Report | None | [http:// Pdf] | |
White House | (2003) | The National Strategy to Secure Cyberspace | Government Report | None | [http:// Pdf] | |
White House | (2009) | Cyberspace Policy Review | Government Report | None | [http:// Pdf] | |
White House | (2010) | The Comprehensive National Cybersecurity Initiative | Government Report | None | [http:// Pdf]ne |
Subcategories: