Cyber electronic warfare

Results: 842



#Item
621Electronic warfare / Hacking / Military technology / Military / Cyberspace / United States Cyber Command / Information warfare / Cyber-security regulation / Air Force Cyber Command / Cyberwarfare / Military science / War

From Cyberspace to Cyberpower: Defining the Problem Dr Dan Kuehl Information Resources Management College/National Defense University

Add to Reading List

Source URL: www.carlisle.army.mil

Language: English - Date: 2009-01-15 16:09:57
622Military science / Electronic warfare / Military technology / National security / United States Cyber Command / Stuxnet / Cyberspace / Internet privacy / Computer security / Cyberwarfare / Hacking / Security

The Future of Things “Cyber”

Add to Reading List

Source URL: chertoffgroup.com

Language: English - Date: 2012-01-10 20:59:00
623Public safety / Cyberwarfare / Electronic warfare / Hacking / Military technology / International Multilateral Partnership Against Cyber Threats / Computer security / Administrative Procedure Act / United States Department of Homeland Security / Security / Computer crimes / Government

Cybersecurity: Selected Legal Issues

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-22 15:42:14
624Military / Computer crimes / United States / Electronic warfare / Hacking / Military technology / Cyberspace / United States Strategic Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Military science / Department of Defense Strategy for Operating in Cyberspace

Space and Cyber: Shared Challenges, Shared Opportunities (Edited Remarks to the USSTRATCOM Cyber and Space Symposium)

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-04-09 17:02:08
625Computer security / Electronic warfare / Hacking / Military technology / War / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / International Cybercrime / National Cyber Security Division / Cyberwarfare / Computer crimes / Security

Microsoft Word[removed]NIST_NTIA Cybersecurity Incentives NOI

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2013-04-30 10:41:42
626Hacking / Military technology / Computer security / War / National Cyber Security Division / Security / Cyberwarfare / Electronic warfare

Before the National Telecommunications Information Administration Washington, D.C[removed]In the Matter of Incentives To Adopt Improved Cybersecurity Practices

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2013-04-29 17:57:47
627Bitcoin / Peer-to-peer computing / Electronic commerce / Electronic warfare / Hacking / Computer network security / Malware / Cyberwarfare / Near field communication / Technology / Computing / Software

From the Desk of [Insert Name Here] As we look ahead toward the cyber threats facing us this year, some key challenges will result from the advancements in technology that are becoming part of our daily lives. Ranging f

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-01-29 15:28:25
628Security / Electronic warfare / Military technology / National security / STIX Fonts project / Vulnerability / Hacking / Cyberwarfare / Computer security

Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:54
629Crime / Security / Cyberwarfare / Electronic warfare / Hacking / Malware / Computer security / Internet security / Cloud computing / Cybercrime / Computer network security / Computer crimes

Multi-State Information Sharing and Analysis Center Monthly Cyber Security Tips NEWSLETTER January 2011

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 22:11:53
630Hacking / Electronic warfare / Military technology / War / Cyber security standards / United States Department of Homeland Security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Computer security / Security

The Internet Security Alliance (ISA) Response to the March 28, 2013 Notice of Inquiry of the U.S. Department of Commerce, National Telecommunications & Information

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2013-04-30 11:13:53
UPDATE