Resource by Type
Jump to navigation
Jump to search
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Report | Low:Policy | ||
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Computer Economics, Inc. | 2007 | 2007 Malware Report | Industry Report | None | Purchase | |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Report | None | ||
Department of Commerce | 2010 | Defense Industrial Base Assessment | Government Report | None | ||
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Report | Low:Law | ||
Energetics Inc. | 2006 | Roadmap to Secure Control Systems in the Energy Sector | Independent Report | None | ||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection | 2008 | Research Agenda for the Banking and Finance Sector | Independent Report | None | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
HP TippingPoint DVLabs | 2010 | 2010 Top Cyber Security Risks Report | Industry report | Moderate:Technology | ||
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Report | Low/None:Technology | ||
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
McAfee, Inc. | 2010 | McAfee Threats Report | Industry Report | None | ||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
National Infrastructure Advisory Council | 2004 | Hardening The Internet | Government Report | High:Technology | ||
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
National Research Council | 1999 | Trust in Cyberspace | Independent Report | Moderate:Technology | ||
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Report | Low:Research Processes; Low:Technology | ||
National Science and Technology Council | 2006 | Federal Plan for Cyber Security and Information Assurance Research and Development | Government Report | None | ||
Networking and Information Technology Research and Development | 2009 | National Cyber Leap Year Summit 2009, Co-Chairs' Report | Government Report | None | ||
President's Commission on Critical Infrastructure Protection | 1997 | Critical Foundations | Government Report | None | ||
President's Information Technology Advisory Council | 2005 | Cyber Security: A Crisis of Prioritization | Government Report | None | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase | |
Symantec Corporation | 2010 | Symantec Global Internet Security Threat Report | Industry Report | Low/Moderate:Technology | ||
Trend Micro Incorporated | 2010 | Trend Micro Annual Report | Industry Report | Moderate:Technology | ||
United States Secret Service | 2004 | Insider Threat Study | Government Report | None | ||
van Eeten, Michel J. G. | Bauer, Johannes M. | 2008 | Economics of Malware | Non-US Govt. Report | Moderate:Economics | |
Verizon | 2010 | 2010 Data Breach Investigations Report | Industry Report | Low:Technology | ||
White House | 2003 | The National Strategy to Secure Cyberspace | Government Report | None | ||
White House | 2010 | The Comprehensive National Cybersecurity Initiative | Government Report | None | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None | ||
Zittrain, Jonathan L. | 2008 | The Future of the Internet and How To Stop It | Book | None |
Subcategories: