Difference between revisions of "Resource by Type"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: '' TOC->Resource by Type'' Anderson, Ross J. (2008) Security Engineering Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security Cen...)
 
Line 10: Line 10:
  
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
 
 
National Research Council (1999) [[Trust in Cyberspace]]
 
  
 
Computer Economics, Inc. (2007) [[2007 Malware Report]]
 
Computer Economics, Inc. (2007) [[2007 Malware Report]]
Line 50: Line 46:
  
 
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
 
National Institute of Standards and Technology ''(2006)'' [[SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security]]
 +
 +
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]
 +
 +
National Research Council (1999) [[Trust in Cyberspace]]
  
 
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]
 
National Science and Technology Council ''(2006)'' [[Federal Plan for Cyber Security and Information Assurance Research and Development]]

Revision as of 12:47, 21 July 2010

TOC->Resource by Type

Anderson, Ross J. (2008) Security Engineering

Camp, L. Jean and Lewis, Stephen (2004) Economics of Information Security

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Computer Economics, Inc. (2007) 2007 Malware Report

Computing Research Association (2003) Four Grand Challenges in Trustworthy Computing

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Department of Homeland Security (2009) A Roadmap for Cybersecurity Research

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

McAfee, Inc. (2010) McAfee Threats Report

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

National Cyber Security Summit Task Force (2004) Information Security Governance

National Infrastructure Advisory Council (2004) Hardening The Internet

National Institute of Standards and Technology (2006) SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

National Research Council (2007) Toward a Safer and More Secure Cyberspace

National Research Council (1999) Trust in Cyberspace

National Science and Technology Council (2006) Federal Plan for Cyber Security and Information Assurance Research and Development

Networking and Information Technology Research and Development (2009) National Cyber Leap Year Summit 2009, Co-Chairs' Report

President's Commission on Critical Infrastructure Protection (1997) Critical Foundations

President's Information Technology Advisory Council (2005) Cyber Security: A Crisis of Prioritization

Schneier, Bruce (2003) Beyond Fear

Schneier, Bruce (2008) Schneier on Security

Symantec Corporation (2010) Symantec Global Internet Security Threat Report

Trend Micro Incorporated (2010) Trend Micro Annual Report

United States Secret Service (2004) Insider Threat Study

White House (2003) The National Strategy to Secure Cyberspace

White House (2009) Cyberspace Policy Review

White House (2010) The Comprehensive National Cybersecurity Initiative

Zittrain, Jonathan L. (2008) The Future of the Internet and How To Stop It

Subcategories:

Jump to Table of Contents