Cyber electronic warfare

Results: 842



#Item
51Electronic warfare / Computer crimes / Hacking / Military technology / United States Cyber Command / Cyberterrorism / Cooperative Cyber Defence Centre of Excellence / Cyber Operations / Cyberspace / Military science / Cyberwarfare / Military

THE LAW OF CYBER WARFARE: QUO VADIS? Michael N. Schmitt* INTRODUCTION ....................................................................................................... 269   I.   NORMATIVE EVOLUTION..........

Add to Reading List

Source URL: journals.law.stanford.edu

Language: English - Date: 2014-06-29 15:47:46
52Electronic warfare / Hacking / Military technology / Cyberwarfare / National security / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Military science / Department of Defense Strategy for Operating in Cyberspace

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
53Electronic warfare / Hacking / Military technology / Military science / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Cyberwarfare / National security

REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2015-05-27 05:43:08
54Military technology / War / Military science / Computer crimes / Military / Industrial espionage / Internet-related prefixes / Cyberspace / Cyber / Cyberwarfare / Hacking / Electronic warfare

Cyber War and Competition in the China-U.S. Relationship1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China’s new strengths means it has a new position a

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-06-01 08:21:55
55Electronic warfare / Hacking / Military technology / International Organization of Securities Commissions / Cyberterrorism / United States Cyber Command / Stuxnet / International Multilateral Partnership Against Cyber Threats / Computer security / Cybercrime / Computer crimes / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.csrc.gov.cn

Language: English - Date: 2014-07-09 12:19:05
56Hacking / Military technology / Crime / War / Technology / Cyber-dissident / Computer crimes / Cyberwarfare / Electronic warfare

PDF Document

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2013-07-09 12:35:09
57Military science / War / Electronic warfare / Military technology / United States Department of Homeland Security / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Cyberterrorism / National Cyber Security Division / Cyberwarfare / Hacking / Computer security

PDF Document

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
58Cyberwarfare / Electronic warfare / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Computer security / National Cyber Security Division / Security / Computer crimes / Public safety

In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee had approved separa

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-04-28 10:54:36
59Iran–United States relations / Electronic warfare / Nuclear program of Iran / Hacking / Stuxnet / Duqu / Ali Khamenei / Army of the Guardians of the Islamic Revolution / Mahmoud Ahmadinejad / Cyberwarfare / Asia / Iran

The Iranian Cyber Threat to the U.S. Homeland Statement before the U.S. House of Representatives Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies and

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2012-04-25 15:09:57
60Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.nl

Language: English - Date: 2015-03-31 09:09:36
UPDATE