Main Content
The Cyber Hub, Cyber Power Index, Booz Allen Hamilton and the Economist Intelligence Unit
2.3.1.2
http://www.cyberhub.com/CyberPowerIndex
The Federal Bureau of Investigation's Ability to Address the National Security Cyber Intrusion Threat, U.S. Department of Justice, Office of the Inspector General, Audit Division., April 2011
3.2.2.4.1
http://www.justice.gov/oig/reports/FBI/a1122r.pdf
The Internet Engineering Task Force, The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force, 15 October, 2011
3.1.2.2.1
https://www.ietf.org/tao.html
The Secretary of Defense, Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, 23 June 2009
3.2.2.2.3
http://www.defense.gov/home/features/2010/0410_cybersec/docs/cyber_command_gates_memo[1].pdf
The White House, International Strategy for Cyberspace, May 2011
3.2.2.1.1
http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Thomas Rid, Think Again: Cyberwar, Foreign Policy, March/April 2012
2.2.1.4
http://www.foreignpolicy.com/articles/2012/02/27/cyberwar?page=0,0
Tyler Moore and Richard Clayton, Examining the Impact of Website Take-down on Phishing, APWG eCrime Researchers Summit, 2007
1.3.5.1.2
http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf
Tyler Moore, Introducing the Economics of Cybersecurity: Principles and Policy Options, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010
2.2.2.2.2
http://sites.nationalacademies.org/CSTB/CSTB_059364
US Secret Service, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, CERT, 2004
1.3.5.2.1
http://www.cyber.st.dhs.gov/docs/its_report_040820.pdf
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp360-367
1.1.2.1
http://www.nap.edu/catalog.php?record_id=12651
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.