National Cyber Security Policy

Results: 150



#Item
41Private Sector Cyber Security Investment Strategies: An Empirical Analysis* Brent R. Rowe Technology Economics and Policy RTI International

Private Sector Cyber Security Investment Strategies: An Empirical Analysis* Brent R. Rowe Technology Economics and Policy RTI International

Add to Reading List

Source URL: weis2006.econinfosec.org

Language: English - Date: 2006-07-20 16:57:22
42Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
43POLICY ADVISORY May 11, 2011 Comments on “Discussion Draft on National Cyber Security Policy” Rohan Joshi & Srijith K Nair

POLICY ADVISORY May 11, 2011 Comments on “Discussion Draft on National Cyber Security Policy” Rohan Joshi & Srijith K Nair

Add to Reading List

Source URL: takshashila.org.in

Language: English - Date: 2011-05-15 22:28:17
441   Australian Defence Policy in the Information Age Submission for the 2015 Australian Defence White Paper Greg Austin 1

1   Australian Defence Policy in the Information Age Submission for the 2015 Australian Defence White Paper Greg Austin 1

Add to Reading List

Source URL: defence.gov.au

Language: English - Date: 2014-09-29 21:59:05
45

Devising a National Cyber Security Strategy and Policy Participant Form

Add to Reading List

Source URL: www.gcsp.ch

    461   Australian Defence Policy in the Information Age Submission for the 2015 Australian Defence White Paper Greg Austin 1

    1   Australian Defence Policy in the Information Age Submission for the 2015 Australian Defence White Paper Greg Austin 1

    Add to Reading List

    Source URL: www.defence.gov.au

    Language: English - Date: 2014-09-29 21:59:05
    47Attachment B Submission Two: National Security Submission to the National Commission of Audit from the Australian Strategic Policy Institute

    Attachment B Submission Two: National Security Submission to the National Commission of Audit from the Australian Strategic Policy Institute

    Add to Reading List

    Source URL: www.ncoa.gov.au

    Language: English - Date: 2014-03-24 01:08:10
    48EUROPEAN PARLIAMENT[removed]Committee on Foreign Affairs

    EUROPEAN PARLIAMENT[removed]Committee on Foreign Affairs

    Add to Reading List

    Source URL: www.europarl.europa.eu

    Language: English - Date: 2015-03-02 06:18:52
    49POLICY AND STRATEGY TRENDS APRIL - MAY - JUNE 2002 Creating trust in critical network infrastructures Danger can come from almost anywhere…

    POLICY AND STRATEGY TRENDS APRIL - MAY - JUNE 2002 Creating trust in critical network infrastructures Danger can come from almost anywhere…

    Add to Reading List

    Source URL: www.itu.int

    Language: English - Date: 2011-04-04 04:20:38
    50U.S. Military Cybersecurity-related Provisions Comparison for Fiscal Year 2014 Update 2 U.S. House of Representatives passed FY 2014 National Defense Authorization Act [NDAA] Act (H.R. 1960); U.S. Senate Armed Services C

    U.S. Military Cybersecurity-related Provisions Comparison for Fiscal Year 2014 Update 2 U.S. House of Representatives passed FY 2014 National Defense Authorization Act [NDAA] Act (H.R. 1960); U.S. Senate Armed Services C

    Add to Reading List

    Source URL: www.spacefoundation.org

    Language: English - Date: 2014-08-11 00:29:56