-
1
-
-
41549146005
-
-
Redmondmag.com. Retrieved February 3, 2008. < >.
-
Bekker, Scott. 2005. "SQL 2005: The Integrated Stack Is Back." Redmondmag.com. Retrieved February 3, 2008. < http://redmondmag.com/features/ article.asp?editorialsid=533Cover Story >.
-
(2005)
"sQL 2005: The Integrated Stack Is Back."
-
-
Bekker, S.1
-
2
-
-
41549105604
-
"hackers Target U. S. Power Grid."
-
p.
-
Blum, Justin. 2005. "Hackers Target U. S. Power Grid." Washington Post, March 11, p. E1.
-
(2005)
Washington Post
, vol.11
-
-
Blum, J.1
-
3
-
-
77953693593
-
-
Government Accountability Office (. GAO). GAO, Washington, DC. Retrieved February 3, 2008. < >.
-
Government Accountability Office (GAO). 2004a. "Challenges and Efforts to Secure Control Systems." GAO, Washington, DC. Retrieved February 3, 2008. < http://www.gao.gov/cgi-bin/getrpt? >.
-
(2004)
"challenges and Efforts to Secure Control Systems."
-
-
-
4
-
-
7044219697
-
-
Government Accountability Office (. GAO). GAO, Washington, DC. Retrieved February 3, 2008. < >.
-
Government Accountability Office (GAO). 2004b. "Critical Infrastructure Protection Challenges and Efforts to Secure Control Systems." GAO, Washington, DC. Retrieved February 3, 2008. < http://www.gao.gov/cgi-bin/getrpt?GAO-04-354 >.
-
(2004)
"critical Infrastructure Protection Challenges and Efforts to Secure Control Systems."
-
-
-
5
-
-
85025595569
-
-
Government Accountability Office (. GAO). GAO, Washington, DC. Retrieved July 19, 2005. < >.
-
Government Accountability Office (GAO). 2005. "Critical Infrastructure Protection: Challenges in Addressing Cybersecurity." GAO, Washington, DC. Retrieved July 19, 2005. < http://www.gao.gov/cgi-bin/getrpt? GAO-05-827T >.
-
(2005)
"critical Infrastructure Protection: Challenges in Addressing Cybersecurity."
-
-
-
6
-
-
14844282642
-
-
Computer and Communications Industry Association. Retrieved September 24, 2003. < >; < >.
-
Geer, Daniel, Charles P. Pfleeger, Bruce Schneier, John S. Quarterman, Perry Metzger, Rebecca Bace Peter Gutmann. 2003. "CyberInsecurity: The Cost of Monopoly: How the Dominance of Microsoft's Products Poses a Risk to Security." Computer and Communications Industry Association. Retrieved September 24, 2003. < http://www.apple.com/education/technicalresources/pdf/ cyberinsecurity.pdf >; < http://www.ccianet.org/papers/cyberinsecurity.pdf >.
-
(2003)
"cyberInsecurity: The Cost of Monopoly: How the Dominance of Microsoft's Products Poses A Risk to Security."
-
-
Geer, D.1
Charles, P.P.2
Bruce, S.3
John, S.Q.4
Perry, M.5
Rebecca, B.6
Peter, G.7
-
7
-
-
41549131052
-
-
Retrieved December 15, 2005. < >.
-
Glasner, Joanna. 2003. "Want PC Security? Diversify." Retrieved December 15, 2005. < http://www.wired.com/news/infostructure/0,1377,60579, 00.html >.
-
(2003)
"want PC Security? Diversify."
-
-
Glasner, J.1
-
8
-
-
29244474466
-
-
Human Security Center. New York: Oxford University Press.
-
Human Security Center. 2005. The Human Security Report 2005. New York : Oxford University Press.
-
(2005)
The Human Security Report 2005.
-
-
-
9
-
-
41549110026
-
-
New York Times, December 11. Retrieved February 3, 2008. < >.
-
Lohr, Steve. 2005. "Can This Man Reprogram Microsoft?" New York Times, December 11. Retrieved February 3, 2008. < http://www.nytimes.com/ 2005/12/11/business/yourmoney/11micro.html >.
-
(2005)
"can This Man Reprogram Microsoft?"
-
-
Lohr, S.1
-
10
-
-
33746044438
-
"windows Is so Slow, but Why?"
-
Retrieved February 3, 2008. < >.
-
Lohr, Steve John Markoff. 2006. "Windows Is So Slow, but Why?" New York Times, March 27. Retrieved February 3, 2008. < http://www.nytimes. com/2006/03/27/technology/27soft.html?ex=1301115600&en=d0c02cd75d5822fb& ei=5088&partner=rssnyt&emc=rss >.
-
(2006)
New York Times
, vol.27
-
-
Lohr, S.1
Markoff, J.2
-
11
-
-
0000950336
-
"small Firm Networks."
-
edited by Nitin Nohria Robert G. Eccles. Boston, MA : Harvard Business School Press
-
Perrow, Charles. 1992. "Small Firm Networks." Pp. 445 70 in Networks and Organizations, edited by Nitin Nohria Robert G. Eccles. Boston, MA : Harvard Business School Press.
-
(1992)
Networks and Organizations
, pp. 445-70
-
-
Perrow, C.1
-
16
-
-
41549138056
-
"trends in Cyber Vulnerabilities, Threats, and Countermeasures. "
-
edited by Jacques S. Gansler Hans Binnendijk. Washington, DC : National Defense University
-
Vadis, Michael A. 2004. "Trends in Cyber Vulnerabilities, Threats, and Countermeasures." Pp. 99 114 in Information Assurance: Trends in Vulnerabilities, Threats, and Technologies, edited by Jacques S. Gansler Hans Binnendijk. Washington, DC : National Defense University.
-
(2004)
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies
, pp. 99-114
-
-
Vadis, M.A.1
|