Public Data Networks: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 8: Line 8:


National Research Council (1999) [[Trust in Cyberspace]]
National Research Council (1999) [[Trust in Cyberspace]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 10:13, 11 August 2010

TOC-> Threats and Actors-> Security Targets-> Communications->Public Data Networks

Anderson, Ross J. (2008) Security Engineering

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

National Research Council (1999) Trust in Cyberspace

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
  • Subcategories: None

Jump to Table of Contents