User contributions
Jump to navigation
Jump to search
- 13:09, 21 July 2010 diff hist -4 Information Sharing/Disclosure
- 13:09, 21 July 2010 diff hist -4 Economics of Cybersecurity
- 13:08, 21 July 2010 diff hist -4 Cybersecurity Annotated Bibliography
- 13:08, 21 July 2010 diff hist -4 Government Reports and Documents
- 13:06, 21 July 2010 diff hist -4 Resource by Type
- 13:06, 21 July 2010 diff hist -4 US Government Reports and Documents
- 13:05, 21 July 2010 diff hist 0 Keyword Index and Glossary of Core Ideas →Computer Network Attack
- 13:04, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Identity Fraud/Theft
- 13:04, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →State Affiliation
- 13:04, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Sponsored Attacks
- 13:03, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Software Vulnerability
- 13:03, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Risk Modeling
- 13:03, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Research & Development
- 13:03, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Outreach and Collaboration
- 13:02, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →National Security
- 13:02, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Interdependencies
- 13:02, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Intelligence Infrastructure/Information Infrastructure
- 13:01, 21 July 2010 diff hist -9 National Cyber Defense Financial Services Workshop Report →Key Words
- 12:59, 21 July 2010 diff hist +100 Keyword Index and Glossary of Core Ideas →Computer Network Attack
- 12:56, 21 July 2010 diff hist +108 Information Sharing/Disclosure
- 12:55, 21 July 2010 diff hist +108 Regulation/Liability
- 12:55, 21 July 2010 diff hist +108 Private Efforts/Organizations
- 12:55, 21 July 2010 diff hist +108 Government Organizations
- 12:55, 21 July 2010 diff hist +108 Deterrence
- 12:55, 21 July 2010 diff hist +108 Approaches
- 12:54, 21 July 2010 diff hist +108 Technology
- 12:54, 21 July 2010 diff hist +108 Issues
- 12:54, 21 July 2010 diff hist +108 Economics of Cybersecurity
- 12:53, 21 July 2010 diff hist +108 Risk Management and Investment
- 12:52, 21 July 2010 diff hist +108 Metrics
- 12:52, 21 July 2010 diff hist +108 Communications
- 12:52, 21 July 2010 diff hist +108 Financial Institutions and Networks
- 12:52, 21 July 2010 diff hist +108 Groups
- 12:51, 21 July 2010 diff hist +108 Threats and Actors
- 12:51, 21 July 2010 diff hist +108 Actors and Incentives
- 12:51, 21 July 2010 diff hist +108 States
- 12:51, 21 July 2010 diff hist +108 Industry Reports
- 12:47, 21 July 2010 diff hist 0 Resource by Type
- 12:45, 21 July 2010 diff hist +2 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 12:45, 21 July 2010 diff hist +93 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 12:31, 21 July 2010 diff hist +380 National Cyber Defense Financial Services Workshop Report →Categorization
- 12:23, 21 July 2010 diff hist +766 National Cyber Defense Financial Services Workshop Report →Key Words
- 12:19, 21 July 2010 diff hist +1 National Cyber Defense Financial Services Workshop Report →Key Words
- 12:12, 21 July 2010 diff hist +1 National Cyber Defense Financial Services Workshop Report →Key Words
- 12:12, 21 July 2010 diff hist +97 National Cyber Defense Financial Services Workshop Report →Key Words
- 10:09, 21 July 2010 diff hist +47 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 09:43, 21 July 2010 diff hist -1 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 09:43, 21 July 2010 diff hist +12 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 09:42, 21 July 2010 diff hist +1,105 National Cyber Defense Financial Services Workshop Report →Additional Notes and Highlights
- 09:28, 21 July 2010 diff hist +2,375 National Cyber Defense Financial Services Workshop Report →Synopsis
- 09:23, 21 July 2010 diff hist +200 National Cyber Defense Financial Services Workshop Report →Synopsis
- 09:17, 21 July 2010 diff hist +94 National Cyber Defense Financial Services Workshop Report →Key Words
- 09:17, 21 July 2010 diff hist +93 National Cyber Defense Financial Services Workshop Report →Key Words
- 11:22, 12 July 2010 diff hist +62 National Cyber Defense Financial Services Workshop Report →Full Citation
- 11:20, 12 July 2010 diff hist +46 Critical Infrastructure Threats and Terrorism →Additional Notes and Highlights
- 11:13, 12 July 2010 diff hist -209 Keyword Index and Glossary of Core Ideas →Red Team
- 11:09, 12 July 2010 diff hist +97 Threats and Actors
- 11:08, 12 July 2010 diff hist +97 Approaches
- 11:08, 12 July 2010 diff hist +97 Government Organizations
- 10:20, 12 July 2010 diff hist +97 Espionage
- 10:20, 12 July 2010 diff hist +97 Cybercrime
- 10:20, 12 July 2010 diff hist +97 Public Data Networks
- 10:20, 12 July 2010 diff hist +97 Telephone
- 10:19, 12 July 2010 diff hist +97 Communications
- 10:19, 12 July 2010 diff hist +97 Water, Sewer, etc.
- 10:19, 12 July 2010 diff hist +97 Transportation
- 10:19, 12 July 2010 diff hist +97 Financial Institutions and Networks
- 10:19, 12 July 2010 diff hist +97 Electricity, Oil and Natural Gas
- 10:19, 12 July 2010 diff hist +97 Private Critical Infrastructure
- 10:18, 12 July 2010 diff hist +97 Military Networks (.mil)
- 10:18, 12 July 2010 diff hist +97 Government Networks (.gov)
- 10:18, 12 July 2010 diff hist +97 Security Targets
- 10:17, 12 July 2010 diff hist +97 Public Critical Infrastructure
- 10:16, 12 July 2010 diff hist +1 Critical Infrastructure Threats and Terrorism →Categorization
- 10:16, 12 July 2010 diff hist +438 Critical Infrastructure Threats and Terrorism →Categorization
- 11:57, 8 July 2010 diff hist -94 Critical Infrastructure Threats and Terrorism →Additional Notes and Highlights
- 11:56, 8 July 2010 diff hist +47 Critical Infrastructure Threats and Terrorism →Additional Notes and Highlights
- 11:55, 8 July 2010 diff hist +1,337 Critical Infrastructure Threats and Terrorism →Additional Notes and Highlights
- 11:44, 8 July 2010 diff hist +26 Critical Infrastructure Threats and Terrorism →Additional Notes and Highlights
- 10:40, 8 July 2010 diff hist +281 Keyword Index and Glossary of Core Ideas →Red Teaming
- 10:36, 8 July 2010 diff hist +37 Keyword Index and Glossary of Core Ideas →Risk Modeling
- 10:35, 8 July 2010 diff hist -11 Keyword Index and Glossary of Core Ideas
- 10:33, 8 July 2010 diff hist -19 Keyword Index and Glossary of Core Ideas →Red Teaming
- 10:32, 8 July 2010 diff hist +80 Keyword Index and Glossary of Core Ideas →Red Teaming
- 10:32, 8 July 2010 diff hist 0 Keyword Index and Glossary of Core Ideas →Red Teaming
- 10:31, 8 July 2010 diff hist +117 Keyword Index and Glossary of Core Ideas
- 10:29, 8 July 2010 diff hist +333 Keyword Index and Glossary of Core Ideas
- 10:27, 8 July 2010 diff hist +66 Critical Infrastructure Threats and Terrorism →Key Words
- 10:23, 8 July 2010 diff hist +484 Critical Infrastructure Threats and Terrorism →Key Words
- 10:18, 8 July 2010 diff hist -2 Keyword Index and Glossary of Core Ideas →Einstein
- 10:09, 25 June 2010 diff hist +107 Public-Private Cooperation
- 10:09, 25 June 2010 diff hist +41 Securing Cyberspace for the 44th Presidency →Categorization
- 10:06, 25 June 2010 diff hist +105 N International Cooperation New page: Center for Strategic and International Studies ''(2008)'' Securing Cyberspace for the 44th Presidency
- 10:05, 25 June 2010 diff hist +2 Securing Cyberspace for the 44th Presidency →Categorization
- 10:04, 25 June 2010 diff hist +44 Securing Cyberspace for the 44th Presidency →Categorization
- 11:55, 23 June 2010 diff hist +2,571 Securing Cyberspace for the 44th Presidency →Additional Notes and Highlights
- 09:22, 23 June 2010 diff hist +127 Securing Cyberspace for the 44th Presidency →Key Words
- 09:06, 23 June 2010 diff hist +3 Securing Cyberspace for the 44th Presidency →Synopsis
- 09:06, 23 June 2010 diff hist +3 Securing Cyberspace for the 44th Presidency →Synopsis
- 14:23, 18 June 2010 diff hist -46 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
- 14:01, 18 June 2010 diff hist -2 Keyword Index and Glossary of Core Ideas →Transparency
- 14:01, 18 June 2010 diff hist +66 Keyword Index and Glossary of Core Ideas →Transparency
- 13:59, 18 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas →Social Engineering
- 13:58, 18 June 2010 diff hist +14 Keyword Index and Glossary of Core Ideas →Research & Development
- 13:58, 18 June 2010 diff hist +121 Keyword Index and Glossary of Core Ideas →Department of Homeland Security
- 13:57, 18 June 2010 diff hist +120 Keyword Index and Glossary of Core Ideas →Research & Development
- 13:57, 18 June 2010 diff hist +236 Hardening The Internet →Key Words
- 11:28, 18 June 2010 diff hist +11 Critical Infrastructure Threats and Terrorism
- 11:27, 18 June 2010 diff hist 0 Critical Infrastructure Threats and Terrorism
- 11:25, 18 June 2010 diff hist +8 Critical Infrastructure Threats and Terrorism
- 11:15, 18 June 2010 diff hist -2 Toward a Safer and More Secure Cyberspace →Full Title of Reference
- 11:03, 18 June 2010 diff hist +9 Hardening The Internet
- 11:02, 18 June 2010 diff hist +161 Hardening The Internet →Additional Notes and Highlights
- 11:01, 18 June 2010 diff hist +10 Hardening The Internet →Key Words
- 11:00, 18 June 2010 diff hist +1,017 Hardening The Internet
- 10:48, 18 June 2010 diff hist +50 Hardening The Internet
- 10:47, 18 June 2010 diff hist -7 Hardening The Internet
- 10:32, 18 June 2010 diff hist +2 Keyword Index and Glossary of Core Ideas →Transparency
- 10:30, 18 June 2010 diff hist +1,001 Information Security Governance
- 10:20, 18 June 2010 diff hist -29 Information Security Governance
- 10:10, 18 June 2010 diff hist +5 National Cyber Defense Financial Services Workshop Report
- 10:08, 18 June 2010 diff hist -11 Cyber Security Research and Development Agenda →Full Citation
- 10:07, 18 June 2010 diff hist +1,029 Cyber Security Research and Development Agenda
- 10:06, 18 June 2010 diff hist +145 Keyword Index and Glossary of Core Ideas →Research & Development
- 10:04, 18 June 2010 diff hist +111 Cyber Security Research and Development Agenda
- 10:03, 18 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas →Research & Development
- 10:02, 18 June 2010 diff hist +89 Keyword Index and Glossary of Core Ideas →Research & Development
- 10:01, 18 June 2010 diff hist +3 Hard Problem List
- 10:00, 18 June 2010 diff hist -28 Hard Problem List
- 10:00, 18 June 2010 diff hist +21 Hard Problem List
- 09:59, 18 June 2010 diff hist +93 Hard Problem List
- 09:59, 18 June 2010 diff hist +795 Hard Problem List →Synopsis
- 09:35, 18 June 2010 diff hist +14 Hard Problem List
- 09:35, 18 June 2010 diff hist +196 Keyword Index and Glossary of Core Ideas →Transparency
- 09:32, 18 June 2010 diff hist +81 Research Agenda for the Banking and Finance Sector
- 09:28, 18 June 2010 diff hist +225 Keyword Index and Glossary of Core Ideas
- 17:31, 17 June 2010 diff hist +1 Government Reports and Documents
- 17:30, 17 June 2010 diff hist +183 Keyword Index and Glossary of Core Ideas →Research & Development
- 17:28, 17 June 2010 diff hist +1 Research Agenda for the Banking and Finance Sector
- 17:27, 17 June 2010 diff hist +107 Research Agenda for the Banking and Finance Sector
- 17:26, 17 June 2010 diff hist +24 Research Agenda for the Banking and Finance Sector
- 17:25, 17 June 2010 diff hist +24 A Roadmap for Cybersecurity Research
- 17:06, 17 June 2010 diff hist +24 Roadmap to Secure Control Systems in the Energy Sector
- 17:04, 17 June 2010 diff hist +7 Roadmap to Secure Control Systems in the Energy Sector
- 17:03, 17 June 2010 diff hist +24 Mission Impact of Foreign Influence on DoD Software
- 17:03, 17 June 2010 diff hist +24 Four Grand Challenges in Trustworthy Computing
- 16:36, 17 June 2010 diff hist +1 Trust in Cyberspace
- 16:36, 17 June 2010 diff hist +95 Trust in Cyberspace
- 16:34, 17 June 2010 diff hist -14 Trust in Cyberspace
- 16:32, 17 June 2010 diff hist +24 Trust in Cyberspace
- 16:31, 17 June 2010 diff hist +26 Toward a Safer and More Secure Cyberspace
- 16:30, 17 June 2010 diff hist +1 Keyword Index and Glossary of Core Ideas
- 16:30, 17 June 2010 diff hist +147 Keyword Index and Glossary of Core Ideas
- 16:29, 17 June 2010 diff hist +107 Toward a Safer and More Secure Cyberspace
- 16:26, 17 June 2010 diff hist +138 Keyword Index and Glossary of Core Ideas
- 16:24, 17 June 2010 diff hist +7 Securing Cyberspace for the 44th Presidency
- 16:22, 17 June 2010 diff hist +142 Securing Cyberspace for the 44th Presidency
- 16:20, 17 June 2010 diff hist +24 Securing Cyberspace for the 44th Presidency
- 16:15, 17 June 2010 diff hist +11 Roadmap to Secure Control Systems in the Energy Sector
- 16:01, 17 June 2010 diff hist +1 Mission Impact of Foreign Influence on DoD Software
- 16:00, 17 June 2010 diff hist -8 Mission Impact of Foreign Influence on DoD Software
- 15:50, 17 June 2010 diff hist -39 Mission Impact of Foreign Influence on DoD Software
- 15:42, 17 June 2010 diff hist 0 Four Grand Challenges in Trustworthy Computing
- 15:39, 17 June 2010 diff hist +1,028 Four Grand Challenges in Trustworthy Computing
- 15:09, 17 June 2010 diff hist -29 Four Grand Challenges in Trustworthy Computing
- 15:07, 17 June 2010 diff hist -95 Toward a Safer and More Secure Cyberspace
- 15:47, 9 June 2010 diff hist +27 Government Reports and Documents
- 14:53, 9 June 2010 diff hist +55 Government Reports and Documents
- 14:52, 9 June 2010 diff hist +72 Government Reports and Documents
- 14:51, 9 June 2010 diff hist +48 Government Reports and Documents
- 14:50, 9 June 2010 diff hist +36 Government Reports and Documents
- 14:50, 9 June 2010 diff hist +36 Government Reports and Documents
- 14:49, 9 June 2010 diff hist +24 Government Reports and Documents
- 14:49, 9 June 2010 diff hist +46 Government Reports and Documents
- 14:48, 9 June 2010 diff hist +21 Government Reports and Documents
- 14:47, 9 June 2010 diff hist +17 Government Reports and Documents
- 14:46, 9 June 2010 diff hist +35 Government Reports and Documents
- 14:46, 9 June 2010 diff hist +42 Government Reports and Documents
- 14:45, 9 June 2010 diff hist +100 Government Reports and Documents
- 14:44, 9 June 2010 diff hist +98 Government Reports and Documents
- 14:43, 9 June 2010 diff hist +32 Government Reports and Documents
- 14:43, 9 June 2010 diff hist +57 Government Reports and Documents
- 14:43, 9 June 2010 diff hist +29 Government Reports and Documents
- 14:42, 9 June 2010 diff hist +59 Government Reports and Documents
- 14:21, 4 June 2010 diff hist -28 Research Agenda for the Banking and Finance Sector
- 14:19, 4 June 2010 diff hist -24 Research Agenda for the Banking and Finance Sector
- 14:18, 4 June 2010 diff hist -35 Securing Cyberspace for the 44th Presidency
- 14:16, 4 June 2010 diff hist -36 Cyberspace Policy Review
- 14:09, 4 June 2010 diff hist -2 National Cyber Leap Year Summit 2009, Co-Chairs' Report
- 14:09, 4 June 2010 diff hist -24 National Cyber Leap Year Summit 2009, Co-Chairs' Report
- 14:02, 4 June 2010 diff hist +27 National Cyber Defense Financial Services Workshop Report
- 13:52, 4 June 2010 diff hist +2 National Cyber Defense Financial Services Workshop Report
- 13:52, 4 June 2010 diff hist -55 National Cyber Defense Financial Services Workshop Report
- 13:49, 4 June 2010 diff hist -9 The Comprehensive National Cybersecurity Initiative
- 13:46, 4 June 2010 diff hist -17 A Roadmap for Cybersecurity Research
- 13:31, 4 June 2010 diff hist -27 The Comprehensive National Cybersecurity Initiative
- 13:31, 4 June 2010 diff hist -24 A Roadmap for Cybersecurity Research
- 13:29, 4 June 2010 diff hist -23 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
- 13:12, 4 June 2010 diff hist +570 N Critical Foundations New page: ==Critical Foundations: Protecting America's Infrastructures== ==Full Citation== President's Commission on Critical Infrastructure Protection (1997): Critical Foundations. Protecting Ame...
- 12:18, 4 June 2010 diff hist -38 Government Reports and Documents
- 12:18, 4 June 2010 diff hist -533 Trust in Cyberspace
- 12:17, 4 June 2010 diff hist -9 Trust in Cyberspace
- 12:17, 4 June 2010 diff hist +1,805 Trust in Cyberspace
- 12:14, 4 June 2010 diff hist +466 N Trust in Cyberspace New page: ==Trust in Cyberspace== ==Full Citation== Fred B. Schneider (Ed.) 1999: Washington, DC: National Academy Press. [http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999....
- 12:04, 4 June 2010 diff hist +544 N Cyber Security Research and Development Agenda New page: ==Cyber Security Research and Development Agenda== ==Full Citation== Institute for Information Infrastructure Protection (2003): Cyber Security Research and Development Agenda. U.S. Gove...
- 12:01, 4 June 2010 diff hist +536 N The National Strategy to Secure Cyberspace New page: ==The National Strategy to Secure Cyberspace== ==Full Citation== Executive Office of the President of the United States (2003): The National Strategy to Secure Cyberspace. U.S. Governmen...
- 11:57, 4 June 2010 diff hist -98 Four Grand Challenges in Trustworthy Computing
- 11:56, 4 June 2010 diff hist +736 N Four Grand Challenges in Trustworthy Computing New page: ==Four Grand Challenges in Trustworthy Computing: Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering== ==Full Citation== National Cyber Se...
- 11:54, 4 June 2010 diff hist -56 Hardening The Internet
- 11:53, 4 June 2010 diff hist +583 N Information Security Governance New page: ==Information Security Governance: A Call to Action== ==Full Citation== National Cyber Security Summit Task Force (2004): Information Security Governance. A Call to Action. U.S. Governme...
- 11:50, 4 June 2010 diff hist +539 N Hardening The Internet New page: ==Hardening The Internet== ==Full Citation== National Infrastructure Advisory Council (2004): Hardening The Internet. U.S. Government. Online Paper. [http://cyber.law.harvard.edu/cyberse...
- 11:45, 4 June 2010 diff hist +607 N Insider Threat Study New page: ==Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector== ==Full Citation== United States Secret Service, Computer Emergency Response Team (2004): Insider Threat...
- 11:42, 4 June 2010 diff hist -76 Government Reports and Documents
- 11:41, 4 June 2010 diff hist +529 N Cyber Security: A Crisis of Prioritization New page: ==Cyber Security: A Crisis of Prioritization== ==Full Citation== President's Information Technology Advisory Council (2005): Cyber Security. A Crisis of Prioritization. U.S. Government. ...
- 14:32, 3 June 2010 diff hist +458 N Hard Problem List New page: ==Hard Problem List== ==Full Citation== INFOSEC Research Council (2005): Hard Problem List. U.S. Government. Online Paper. [http://www.cyber.st.dhs.gov/docs/IRC_Hard_Problem_List.pdf '...
- 14:28, 3 June 2010 diff hist +512 N Roadmap to Secure Control Systems in the Energy Sector New page: ==Roadmap to Secure Control Systems in the Energy Sector== ==Full Citation== Department of Energy (2006): Roadmap to Secure Control Systems in the Energy Sector. U.S. Government. Online ...
- 15:56, 2 June 2010 diff hist +1,727 N Federal Plan for Cyber Security and Information Assurance Research and Development New page: ==Federal Plan for Cyber Security and Information Assurance Research and Development== ==Full Citation== National Science, Technology Council: Federal Plan for Cyber Security and Informa...
- 15:28, 2 June 2010 diff hist -1 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
- 15:26, 2 June 2010 diff hist +1 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
- 15:26, 2 June 2010 diff hist -161 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
- 15:25, 2 June 2010 diff hist +1,071 N SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security New page: http://www.cyber.st.dhs.gov/docs/NIST%20Guide%20to%20Supervisory%20and%20Data%20Acquisition-SCADA%20and%20Industrial%20Control%20Systems%20Security%20(2007).pdf ==SP 800-82: Guide to Supe...
- 12:49, 2 June 2010 diff hist -20 The Economics of Online Crime
- 12:49, 2 June 2010 diff hist -1 Economics of Cybersecurity
- 12:47, 2 June 2010 diff hist +723 N Is Cybersecurity a Public Good New page: ==Is Cybersecurity a Public Good? Evidence from the Financial Services Industry== ==Full Citation== Benjamin Powell, ''Is Cybersecurity a Public Good? Evidence from the Financial Service...
- 12:42, 2 June 2010 diff hist +67 Economics of Cybersecurity
- 11:55, 2 June 2010 diff hist +2 Toward a Safer and More Secure Cyberspace
- 11:52, 2 June 2010 diff hist +1,204 N Mission Impact of Foreign Influence on DoD Software New page: ==Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software== ==Full Citation== Defense Science Board Task force Department of Defense (2007):...
- 11:51, 2 June 2010 diff hist -50 Government Reports and Documents
- 11:47, 2 June 2010 diff hist +1,204 N Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software New page: ==Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software== ==Full Citation== Defense Science Board Task force Department of Defense (2007):... current
- 11:37, 2 June 2010 diff hist +1,786 N Toward a Safer and More Secure Cyberspace New page: ==Toward a Safer and More Secure Cyberspace== ==Full Citation== Financial Services Sector Coordinating Council for Critical Infrastructure Protection, Homeland Security Research, Develop...
- 09:43, 1 June 2010 diff hist +1,832 N Research Agenda for the Banking and Finance Sector New page: ==Research Agenda for the Banking and Finance Sector== ==Full Citation== Financial Services Sector Coordinating Council for Critical Infrastructure Protection, Homeland Security Research...
- 13:29, 29 May 2010 diff hist +1,281 N Securing Cyberspace for the 44th Presidency New page: ==Securing Cyberspace for the 44th Presidency== ==Full Citation== Center for Strategic, International Studies (2008): Securing Cyberspace for the 44th Presidency. U.S. Government. Online...
- 13:13, 29 May 2010 diff hist +2,121 N Cyberspace Policy Review New page: ==National Cyber Defense Financial Services Workshop Report== ==Full Citation== Executive Office of the President of The United States (2009): Cyberspace Policy Review. Assuring a Truste...
- 12:56, 29 May 2010 diff hist -12 Government Reports and Documents
- 12:52, 29 May 2010 diff hist +3,258 N National Cyber Leap Year Summit 2009, Co-Chairs' Report New page: ==National Cyber Leap Year Summit 2009, Co-Chairs' Report== ==Full Citation== Networking and Information Technology Research and Development (2009): National Cyber Leap Year Summit 2009....
- 12:12, 29 May 2010 diff hist +1,841 N National Cyber Defense Financial Services Workshop Report New page: ==National Cyber Defense Financial Services Workshop Report== ==Full Citation== O. Sami Saydjari, Salvatore J. Stolfo, Dan Schutzer (Ed.) (2009): National Cyber Defense Financial Service...
- 17:04, 27 May 2010 diff hist +950 N The Comprehensive National Cybersecurity Initiative New page: ==The Comprehensive National Cybersecurity Initiative== ==Full Citation== Executive Office of the President of The United States (2010): The Comprehensive National Cybersecurity Initiati...
- 16:40, 27 May 2010 diff hist -64 A Roadmap for Cybersecurity Research
- 16:39, 27 May 2010 diff hist +12 A Roadmap for Cybersecurity Research
- 16:38, 27 May 2010 diff hist 0 A Roadmap for Cybersecurity Research
- 16:38, 27 May 2010 diff hist +911 A Roadmap for Cybersecurity Research
- 16:15, 27 May 2010 diff hist -507 Government Reports and Documents
- 16:15, 27 May 2010 diff hist +12 A Roadmap for Cybersecurity Research
- 16:13, 27 May 2010 diff hist 0 A Roadmap for Cybersecurity Research
- 16:13, 27 May 2010 diff hist +7 A Roadmap for Cybersecurity Research
- 16:12, 27 May 2010 diff hist +194 A Roadmap for Cybersecurity Research
- 15:49, 27 May 2010 diff hist +525 N A Roadmap for Cybersecurity Research New page: ==A Roadmap for Cybersecurity Research== ==Full Citation== ''Bluebook Style'' Article in Journal: John Maynard Smith, ''The Origin of Altruism,'' 639 Nature 393 (1998). [URL_of_Article...
- 15:35, 27 May 2010 diff hist +2,130 Government Reports and Documents
- 14:30, 27 May 2010 diff hist +14 N Government Reports and Documents New page: First page
- 10:25, 27 May 2010 diff hist +1 Main Page