Difference between revisions of "Identity Management"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 2: Line 2:
  
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
White House (2009) [[Cyberspace Policy Review]]
 
  
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 16: Line 14:
 
|-
 
|-
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
 +
|-
 +
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf'']
 
|}
 
|}
  

Revision as of 16:05, 11 August 2010

TOC-> Issues->Identity Management

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Author 1 Author 2 Year Title Source Expertise Full Text
Schneier, Bruce 2003 Beyond Fear Book None Scribd
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents