Difference between revisions of "Identity Management"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 3: Line 3:
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
  
Schneier, Bruce (2003) [[Beyond Fear]]
+
White House (2009) [[Cyberspace Policy Review]]
  
White House (2009) [[Cyberspace Policy Review]]
+
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 +
|-
 +
! style="background-color: #efefef;" | Author 1
 +
! style="background-color: #efefef;" | Author 2
 +
! style="background-color: #efefef;" | Year
 +
! style="background-color: #efefef;" | Title
 +
! style="background-color: #efefef;" | Source
 +
! style="background-color: #efefef;" | Expertise
 +
! style="background-color: #efefef;" class="unsortable" | Full Text 
 +
|-
 +
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
 +
|}
  
 
*'''''Subcategories:''''' ''None''
 
*'''''Subcategories:''''' ''None''
  
 
''[[Table of Contents| Jump to Table of Contents]]''
 
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 14:37, 11 August 2010

TOC-> Issues->Identity Management

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

White House (2009) Cyberspace Policy Review

Author 1 Author 2 Year Title Source Expertise Full Text
Schneier, Bruce 2003 Beyond Fear Book None Scribd
  • Subcategories: None

Jump to Table of Contents