This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (4/4 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/4 playlist item notes are private)
|1||Show/Hide More||Historical Perspective|
|2.2||Show/Hide More||Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)|
|3||Show/Hide More||Security Examples|
|4||Show/Hide More||[SKIM] State-based Attacks|
July 15, 2016
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at email@example.com. Thank you.