Difference between revisions of "Public Critical Infrastructure"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 4: Line 4:
  
 
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
 
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
 
Department of Defense (2005) [[Strategy for Homeland Defense and Civil Support]]
 
  
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
 
Department of Defense (2007) [[Mission Impact of Foreign Influence on DoD Software]]
Line 30: Line 28:
 
|-
 
|-
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
 
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Government Report||None||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf  ''Pdf'']
 +
|-
 +
|Department of Defense||||2005||[[Strategy for Homeland Defense and Civil Support]]||Government Report||None||[http://www.defense.gov/news/Jun2005/d20050630homeland.pdf  ''Pdf'']
 
|}
 
|}
  

Revision as of 15:13, 11 August 2010