Cybersecurity and Cyberwarfare: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 26: | Line 26: | ||
Description to come shortly .... | Description to come shortly .... | ||
<onlyinclude> | |||
== Readings == | == Readings == | ||
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | * [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security] | ||
Line 32: | Line 32: | ||
== Optional Readings == | == Optional Readings == | ||
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment] | * [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment] | ||
</onlyinclude> | |||
== Class Discussion == | == Class Discussion == | ||
== Links == | == Links == |
Revision as of 14:22, 25 January 2011
May 3
Description to come shortly ....