Search results
Jump to navigation
Jump to search
- Cornish, Paul (2009) [[Cyber Security and Politically, Socially and Religiously Motivated Cornish, Paul, Hughes, Rex, and Livingstone, David (2009) [[Cyberspace and the National S ...3 KB (425 words) - 13:01, 4 April 2012
- Thomas M. Lenard and Paul H. Rubin, ''Much Ado About Notification: Does the Rush to Pass State-Level ...1 KB (208 words) - 15:05, 4 June 2010
- Thomas M. Lenard and Paul H. Rubin, ''Much Ado About Notification: Does the Rush to Pass State-Level ...3 KB (417 words) - 20:27, 19 August 2010
- Paul Cornish, Rex Hughes and David Livingstone, ''Cyberspace and the National Se Dr Paul Cornish holds the Carrington Chair in ...9 KB (1,263 words) - 14:30, 17 June 2010
- Thomas M. Lenard and Paul H. Rubin, ''An Economic Analysis of Notification Requirements for Data Secu ...5 KB (670 words) - 20:21, 19 August 2010
- Paul Cornish, ''Cyber Security and Politically, Socially and Religiously Motivat ...5 KB (684 words) - 15:47, 25 June 2010
- Paul Schwartz and Edward Janger, ''Notification of Data Security Breaches'' (200 ...9 KB (1,233 words) - 20:41, 19 August 2010
- ...elopment of American cybersecurity policy. The Workshop Report, written by Paul Rosenzweig, can be found [https://www.fbiic.gov/public/2010/jan/cyberspace. ...7 KB (989 words) - 15:40, 23 July 2012
- RAND in the early 1960s, Paul Baran con- ...9 KB (1,343 words) - 18:32, 10 August 2010