Identity Management: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]


Schneier, Bruce (2003) [[Beyond Fear]]
White House (2009) [[Cyberspace Policy Review]]


White House (2009) [[Cyberspace Policy Review]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
|-
! style="background-color: #efefef;" | Author 1
! style="background-color: #efefef;" | Author 2
! style="background-color: #efefef;" | Year
! style="background-color: #efefef;" | Title
! style="background-color: #efefef;" | Source
! style="background-color: #efefef;" | Expertise
! style="background-color: #efefef;" class="unsortable" | Full Text 
|-
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents| Jump to Table of Contents]]''
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 09:37, 11 August 2010

TOC-> Issues->Identity Management

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

White House (2009) Cyberspace Policy Review

Author 1 Author 2 Year Title Source Expertise Full Text
Schneier, Bruce 2003 Beyond Fear Book None Scribd
  • Subcategories: None

Jump to Table of Contents