Difference between revisions of "Telephone"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 6: Line 6:
  
 
National Research Council (1999) [[Trust in Cyberspace]]
 
National Research Council (1999) [[Trust in Cyberspace]]
 +
 +
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 +
|-
 +
! style="background-color: #efefef;" | Author 1
 +
! style="background-color: #efefef;" | Author 2
 +
! style="background-color: #efefef;" | Year
 +
! style="background-color: #efefef;" | Title
 +
! style="background-color: #efefef;" | Source
 +
! style="background-color: #efefef;" | Expertise
 +
! style="background-color: #efefef;" class="unsortable" | Full Text 
 +
|-
 +
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
 +
|}
  
 
*'''''Subcategories:''''' ''None''
 
*'''''Subcategories:''''' ''None''
  
 
''[[Table of Contents| Jump to Table of Contents]]''
 
''[[Table of Contents| Jump to Table of Contents]]''

Revision as of 14:13, 11 August 2010

TOC-> Threats and Actors-> Security Targets-> Communications->Telephone

Anderson, Ross J. (2008) Security Engineering

Deputy Chief of Staff for Intelligence (2006) Critical Infrastructure Threats and Terrorism

National Research Council (1999) Trust in Cyberspace

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
  • Subcategories: None

Jump to Table of Contents