Report to the President's Commission on Critical Infrastructure Protection
暂无分享,去创建一个
[1] Vanessa J. Jiménez,et al. Concurrent Tribal and State Jurisdiction Under Public Law 280 , 1998 .
[2] Edward M. Roche,et al. Critical Foundations: Protecting America's Infrastructures , 1998 .
[3] C Wilder. JAVA IN GEAR , 1996 .
[4] Andrew T. Stull. Life on the Internet , 1996 .
[5] J. O'Connor,et al. An information lifeline to the disaster area: the Emergency Response Link , 1995, Proceedings of MILCOM '95.
[6] S. V. Wunnava,et al. Development of an operational medical network (MEDNET) model , 1995, Proceedings IEEE Southeastcon '95. Visualize the Future.
[7] S S Fuller,et al. Internet connectivity for hospitals and hospital libraries: strategies. , 1995, Bulletin of the Medical Library Association.
[8] Peter G. Neumann,et al. Computer-related risks , 1994 .
[9] Donald E. Green. The Contextual Nature of American Indian Criminality , 1993 .
[10] Alfonso Fuggetta. Panel Presentation , 1991, ESEC.
[11] David Clark,et al. Computers at risk: safe computing in the information age , 1991 .
[12] Telecommunications Board. Computers at Risk: Safe Computing in the Information Age , 1990 .
[13] Mary Kidder Rak. Border patrol , 1938 .