Models of critical information infrastructure protection
暂无分享,去创建一个
[1] E. Graham,et al. US National Security: And Foreign Direct Investment , 2006 .
[2] Philip E. Auerswald,et al. Seeds of Disaster, Roots of Response: How Private Action Can Reduce Public Vulnerability , 2006 .
[3] Brian Lopez. Seeds of Disaster, Roots of Response: Critical Infrastructure Protection in the United States Since 1993 , 2006 .
[4] Herbert L. Packer,et al. Two Models of the Criminal Process , 1964 .
[5] Jan Metzger,et al. International CIIP Handbook , 2004 .
[6] Avishalom Tor,et al. Overcoming Impediments to Information Sharing , 2003 .
[7] John Braithwaite,et al. Enforced Self-Regulation: A New Strategy for Corporate Crime Control , 1982 .
[8] Kent Roach,et al. Four Models of the Criminal Process , 1999 .
[9] Dan Assaf,et al. Government Intervention in Information Infrastructure Protection , 2007, Critical Infrastructure Protection.
[10] Anthony Ogus,et al. Regulatory Institutions and Structures , 2002 .
[11] Sujeet Shenoi,et al. Critical infrastructure protection , 2007 .
[12] Michael Freeman,et al. Cyber Security: Are Economic Incentives Adequate? , 2007, Critical Infrastructure Protection.
[13] James Lewis. New Objectives for CFIUS: Foreign Ownership, Critical Infrastructure, and Communications Interception , 2005 .
[14] Michael J. Trebilcock,et al. Privatization and Accountability , 2003 .