This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (2/2 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/2 playlist item notes are private)
|1||Show/Hide More||2.2.4.a Public/Private|
|1.1||Show/Hide More||Business Software Alliance, Center for Democracy & Technology, U.S. Chamber of Commerce, Internet Security Alliance, Tech America, Improving our Nation’s Cybersecurity through the Public-Private Partnership: a White Paper, Mar 8, 2011|
|1.2||Show/Hide More||Paul Rosenzweig, Cyber Security and Public Goods: The Public/Private “Partnership”, Hoover Institution, 2011|
|2||Show/Hide More||2.2.4.b Attack/Exploitation|
|2.1||Show/Hide More||William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Ch. 2.4-2.6, 2009, pp 134-153|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at email@example.com. Thank you.