This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (4/4 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/4 playlist item notes are private)
|1||Show/Hide More||Historical Perspective|
|2||Show/Hide More||Security Theory|
|2.2||Show/Hide More||Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)|
|3||Show/Hide More||Security Examples|
|4||Show/Hide More||[SKIM] State-based Attacks|
December 16, 2014
Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.