Difference between revisions of "Cybersecurity and Cyberwarfare"

From Technologies of Politics and Control
Jump to navigation Jump to search
Line 26: Line 26:
  
 
Description to come shortly ....
 
Description to come shortly ....
 
+
<onlyinclude>
 
== Readings ==
 
== Readings ==
 
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
 
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]
Line 32: Line 32:
 
== Optional Readings ==
 
== Optional Readings ==
 
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]
 
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]
 
+
</onlyinclude>
 
== Class Discussion ==
 
== Class Discussion ==
  
 
== Links ==
 
== Links ==

Revision as of 19:22, 25 January 2011