Cyber electronic warfare

Results: 842



#Item
491Military / Electronic warfare / USACEWP / Full-spectrum dominance / Military doctrine / Information warfare / Command and control warfare / Fleet Electronic Warfare Center / Cyber electronic warfare / Cyberwarfare / Military science / Information operations

Microsoft Word - FM 3-36 FEF01_4Feb09.docm

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
492United States Department of Homeland Security / Government / Computer crimes / Electronic warfare / Military technology / Cyber-security regulation / Critical infrastructure protection / Computer security / National Security Agency / National security / Cyberwarfare / Security

Cybersecurity and Intelligence: The U.S. Approach Publication No[removed]E Revised 15 June[removed]Holly Porteous

Add to Reading List

Source URL: www.parl.gc.ca

Language: English - Date: 2011-07-07 10:01:21
493National security / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / United States Cyber Command / Critical infrastructure protection / Air Force Cyber Command / Information warfare / Military science / Cyberwarfare / Military

Defense A publication of the Number 68

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-03-06 11:49:10
494Hacking / Military technology / Military brats / Military of the United States / United States Cyber Command / James A. Winnefeld /  Jr. / Cyberwarfare / John McCain / Barbara Mikulski / United States / Military / Electronic warfare

S. HRG. 111–896 NOMINATIONS BEFORE THE SENATE ARMED SERVICES COMMITTEE, SECOND SESSION, 111TH CONGRESS HEARINGS BEFORE THE

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 17:01:32
495Military science / War / Electronic warfare / Military technology / United States Department of Homeland Security / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Cyberterrorism / National Cyber Security Division / Cyberwarfare / Hacking / Computer security

Section 5 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the Information and Communications Technology (ICT) advancement in recent years, information and communication networks such as the Internet have

Add to Reading List

Source URL: www.mod.go.jp

Language: English - Date: 2014-08-04 21:38:07
496Security / Cyber-physical system / Electronic warfare / Military technology / Vulnerability / International Multilateral Partnership Against Cyber Threats / Hacking / Computer security / Cyberwarfare

Designed-In Cyber Security for Cyber-Physical Systems Workshop Report by the Cyber Security Research Alliance 4-5 April 2013 in Gaithersburg, Maryland Co-sponsored with the National Institute of Standards and Technology

Add to Reading List

Source URL: www.cybersecurityresearch.org

Language: English - Date: 2013-08-30 11:50:47
497Bitcoin / Peer-to-peer computing / Electronic commerce / Electronic warfare / Hacking / Computer network security / Malware / Smartphone / Cyberwarfare / Technology / Computing / Software

From the Desk of [Insert Name Here] As we look ahead toward the cyber threats facing us this year, some key challenges will result from the advancements in technology that are becoming part of our daily lives. Ranging f

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-02-11 10:54:54
498Security / Electronic warfare / Military technology / National security / STIX Fonts project / Vulnerability / Hacking / Cyberwarfare / Computer security

Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
499Military technology / Cyberwarfare / Howard Schmidt / War / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / Gopal Khanna / Computer security / Cyber-security regulation / Computer crimes / Hacking / Electronic warfare

AGENDA PRE-SUMMIT VIP RECEPTION The Honorable Howard A. Schmidt, CISSP, CSSLP Former Special Assistant to the President and Cyber Security Coordinator Cyber Security Summit 2012 commenced with the Honorable Howard Schmid

Add to Reading List

Source URL: www.cybersecuritysummit.org

Language: English - Date: 2013-06-06 16:40:03
500Hacking / Military technology / Cyberwarfare / Military science / Jus ad bellum / Military / International humanitarian law / Cyberwarfare in the United States / United States Cyber Command / Laws of war / War / Electronic warfare

A Note on the Laws of War in Cyberspace James A. Lewis April 2010 There is some disagreement as to whether we can apply the existing legal framework for warfare to cyber conflict or whether a new legal framework is neede

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-05-21 10:18:02
UPDATE