Browse Items (117 total)

http://www.nsa.gov/public_info/_files/speeches_testimonies/100603_alexander_transcript.pdf

http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/

http://blogs.forbes.com/firewall/2010/03/25/cyberwar-or-not-cyberwar-and-why-that-is-the-question/

http://faculty.nps.edu/dedennin/publications/Denning-BarriersToEntry.pdf

http://csis.org/files/publication/100311_TheCyberWarHasNotBegun.pdf

http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf

Tags:

Main Argument: Many articles and reports focus on how cyber attacks have the potential to damage critical infrastructure. The authors of this book argue that cyber attacks can actually be used for security purposes as well. Rather than creating…

Tags: , , ,

http://www.whitehouse.gov/sites/default/files/cybersecurity.pdf

http://www.uscc.gov/annual_report/2009/annual_report_full_09.pdf