Public Critical Infrastructure: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 4: Line 4:


Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]


Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Line 30: Line 28:
|-
|-
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
|-
|Department of Defense||||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
|}
|}



Revision as of 10:13, 11 August 2010