Integrating Federal Approaches to Post-Cyber Incident Mitigation
暂无分享,去创建一个
[1] Robert Chesney. Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate , 2011 .
[2] Yacov Y. Haimes,et al. The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions , 2011 .
[3] J. Westby. HOMELAND SECURITY VS. HOMELAND DEFENSE: GAPS GALORE , 2009 .
[4] Austen D. Givens,et al. Achieving Resilience in Disaster Management: The Role of Public-Private Partnerships , 2013 .
[5] R. Dipert. The Ethics of Cyberwarfare , 2010 .
[6] William J. Lynn,et al. Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .
[7] B. Obama. Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .
[8] Amitai Etzioni. Cybersecurity in the Private Sector , 2011 .
[9] Nathan E. Busch,et al. Public-Private Partnerships in Homeland Security: Opportunities and Challenges , 2012 .
[10] S. Zeadally,et al. Cybersecurity and US Legislative Efforts to address Cybercrime , 2013 .
[11] Richard J. Harknett,et al. Journal of Homeland Security and Emergency Management Leaving Deterrence Behind : War-Fighting and National Cybersecurity , 2011 .
[12] C. J. Dunlap. Perspectives for Cyber Strategists on Law for Cyberwar , 2011 .
[13] Michael Masters. Committee on Homeland Security and Governmental Affairs , 2008 .
[14] Katherine Lenane,et al. Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities , 2011 .
[15] Eric A. Fischer. Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions [November 9, 2012] , 2012 .
[16] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[17] Jeffery K. Toomer. A Strategic View of Homeland Security: Relooking the Posse Comitatus Act and DOD's Role in Homeland Security , 2002 .
[18] Richard J. Harknett,et al. The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen , 2009 .
[19] David M Hollis. USCYBERCOM: The Need for a Combatant Command versus a Subunified Command , 2010 .
[20] Alice R. Buchalter. Military Support to Civil Authorities: The Role of the Department of Defense in Support of Homeland Defense , 2007 .
[21] Charles Doyle. The USA PATRIOT Act: A Sketch , 2002 .
[22] Nathan E. Busch,et al. Realizing the promise of public-private partnerships in U.S. critical infrastructure protection , 2013, Int. J. Crit. Infrastructure Prot..
[23] Audrey Guinchard,et al. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy , 2011 .
[24] G. McGraw. Cyber War is Inevitable (Unless We Build Security In) , 2013 .
[25] A. Schneider,et al. Behavioral Assumptions of Policy Tools , 1990, The Journal of Politics.