Identity Management: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]] | Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]] | ||
White House (2009) [[Cyberspace Policy Review]] | |||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | |||
|- | |||
! style="background-color: #efefef;" | Author 1 | |||
! style="background-color: #efefef;" | Author 2 | |||
! style="background-color: #efefef;" | Year | |||
! style="background-color: #efefef;" | Title | |||
! style="background-color: #efefef;" | Source | |||
! style="background-color: #efefef;" | Expertise | |||
! style="background-color: #efefef;" class="unsortable" | Full Text | |||
|- | |||
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd''] | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents| Jump to Table of Contents]]'' | ''[[Table of Contents| Jump to Table of Contents]]'' |
Revision as of 09:37, 11 August 2010
TOC-> Issues->Identity Management
Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing
White House (2009) Cyberspace Policy Review
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd |
- Subcategories: None