Difference between revisions of "Identity Management"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 11: Line 11:
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 
! style="background-color: #efefef;" class="unsortable" | Full Text   
 
|-
 
|-
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
+
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Report||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
 
|-
 
|-
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']
 
|Schneier, Bruce||||2003||[[Beyond Fear]]||Book||None||[http://www.scribd.com/doc/12185921/beyond-fear-thinking-sensibly-about-security-in-an-uncertain-world-bruce-schneier-copernicus-books-2003 ''Scribd'']

Revision as of 20:45, 20 August 2010

TOC-> Issues->Identity Management

Author 1 Author 2 Year Title Source Expertise Full Text
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Report None Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
White House 2009 Cyberspace Policy Review Government Report None Pdf
  • Subcategories: None

Jump to Table of Contents