Deterrence: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 27: Line 27:
|Schneier, Bruce || ||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|Schneier, Bruce || ||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|-
|-
| Sklerov, Matthew J. || ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]|| ||None||
| Sklerov, Matthew J. || ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Low:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf  ''Pdf'']
|-
|-
| Todd, Graham H. || ||2009||[[Armed Attack in Cyberspace]]|| ||None||
| Todd, Graham H. || ||2009||[[Armed Attack in Cyberspace]]|| ||None||

Revision as of 13:45, 10 August 2010

TOC-> Approaches->Deterrence

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross, et. al 2008 Security Economics and the Internal Market Study Low:Economics Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
Kobayashi, Bruce H. 2006 An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and Other Public Security Goods Journal Article High:Economics Pdf
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf AltPdf
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf AltPdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Low:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace None
Watts, Sean 2010 Combatant Status and Computer Network Attack None
  • Subcategories: None

Jump to Table of Contents