Cyberspace

Results: 2446



#Item
541

INTRODUCTION Why Submarine Cables? Douglas Burnett, Tara Davenport and Robert Beckman “Cyberspace, in the physical form of undersea fiber-optic cables, carries an even

Add to Reading List

Source URL: www.sargassoalliance.org

Language: English - Date: 2014-12-15 12:31:03
    542Massachusetts Institute of Technology / Cyberwarfare / Internet-related prefixes / Artificial intelligence / Academia / MIT Computer Science and Artificial Intelligence Laboratory / Cyberspace / Technology

    SYLLABUS Cyber International Relations: Emergent Realities of Conflict and Cooperation (Independent Activities Period 2012 Massachusetts Institute of Technology

    Add to Reading List

    Source URL: ecir.mit.edu

    Language: English - Date: 2013-03-29 03:15:03
    543Institute for Security and Development Policy / Cyberspace / Crime / Computer security / Sino-American relations / Cyberpunk / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / National security

    Policy Brief No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

    Add to Reading List

    Source URL: www.isdp.eu

    Language: English - Date: 2014-06-19 09:11:43
    544Ethics / Crime / Security / Hacking / Military technology / Legal aspects of computing / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Cyberethics / Computer crimes / Computer law / Cyberspace

    ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION

    Add to Reading List

    Source URL: www.cio.co.ke

    Language: English - Date: 2015-07-19 09:52:38
    545United States federal executive departments / Military science / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Insider / National security

    GAO, INSIDER THREATS: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

    Add to Reading List

    Source URL: cryptome.org

    Language: English - Date: 2015-06-02 15:11:33
    546William Gibson / Cartography / Humanities / Cyberspace / Information Age / Virtual reality

    7973 Prelims (i-xii

    Add to Reading List

    Source URL: personalpages.manchester.ac.uk

    Language: English - Date: 2008-10-08 16:40:50
    547

    Friedrich-Naumann-Stiftung James Gomez Between Freedom and Censorship. Asian Political Parties in Cyberspace

    Add to Reading List

    Source URL: www.fnf.org.ph

    Language: English - Date: 2008-06-18 18:05:32
      548

        From  the  Feminist  Upheaval  to  Cyberspace:     The  Far  West  of  Opportunities.      

      Add to Reading List

      Source URL: mauvaiscontact.info

      - Date: 2015-03-18 06:06:37
        549

        Internet and Censorship in Germany Leave-taking of the international Internet? A short introduction »There’s a common belief that cyberspace cannot be regulated – that it is, in its very essence, immune from the gov

        Add to Reading List

        Source URL: odem.org

        - Date: 2007-12-16 18:17:09
          550

          30. januarCenter for Cybersikkerhed: Truslen i cyberspace Hovedvurdering De alvorligste cybertrusler mod Danmark kommer fra statslige aktører, som bl.a. ved brug af deres nationale efterretningstjenester udnytter

          Add to Reading List

          Source URL: fe-ddis.dk

            UPDATE