Espionage

From Cybersecurity Wiki
Jump to navigation Jump to search

TOC-> Issues->Espionage

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict Law Review Moderate:Law Pdf
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Hollis, Duncan B. 2007 Why States Need an International Law for Information Operations Law Review Moderate:Law Pdf
Nye, Joseph 2010 Cyber Power Book Excerpt Low:Technology; Low:Policy Pdf
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Stohl, Michael 2006 Cyber Terrorism Journal Article None Purchase
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf

Jump to Table of Contents