Government Organizations: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
National Research Council (1999) [[Trust in Cyberspace]] | National Research Council (1999) [[Trust in Cyberspace]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 40: | Line 38: | ||
|- | |- | ||
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase''] | |Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase''] | ||
|- | |||
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 11:06, 11 August 2010
TOC-> Approaches->Government Organizations
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Research Council (1999) Trust in Cyberspace
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None