Cyberspace

Results: 2446



#Item
581Code and Other Laws of Cyberspace / Cyberspace / Computing / Lawrence Lessig / Internet-related prefixes / Legal aspects of computing / Cyberculture / Computer law / Technology / Law

Lessig’s Code •••• Where Do You Want To Go Today? Have you ever heard that phrase before? It’s actually been a hard one to miss. Microsoft’s been asking that question repeatedly for at least a year or two.

Add to Reading List

Source URL: code-is-law.org

Language: English - Date: 2014-03-31 15:56:37
582National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / United States Department of Homeland Security / Computer security / Crime / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / Cyberwarfare

Sharing Cyber Security Information - Good Practice Stemming from the Dutch Public-Private Approach

Add to Reading List

Source URL: www.gccs2015.com

Language: English - Date: 2015-04-07 05:18:19
583Defense Technical Information Center / Science / Government procurement in the United States / Personally identifiable information / Data sharing / Assistant Secretary of Defense for Public Affairs / Data & Analysis Center for Software / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / United States federal executive departments / Archival science

DEPARTMENT OF DEFENSE PLAN TO ESTABLISH PUBLIC ACCESS TO THE RESULTS OF FEDERALLY FUNDED RESEARCH February 2015

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2015-05-12 13:46:27
584National security / Military science / Grid computing / Military communications / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military-industrial complex / United States Department of Defense / United States Strategic Command

DHS FY 2013 Federal Program Inventory

Add to Reading List

Source URL: dcmo.defense.gov

Language: English - Date: 2013-06-18 15:28:11
585Electronic warfare / Computer crimes / Department of Defense Strategy for Operating in Cyberspace / Hacking / Military technology / War / U.S. Department of Defense Strategy for Operating in Cyberspace / International Multilateral Partnership Against Cyber Threats / United States Cyber Command / Cyberwarfare / National security / Military science

Defense of DoD Networks, System and Data

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2014-07-21 13:46:01
586Social psychology / War / Terrorism / Electronic warfare / Military technology / Cyberterrorism / Federal Bureau of Investigation / Computer insecurity / Malware / Computer crimes / Cyberwarfare / Crime

Attribution in Cyberspace: Challenges for U.S. Law Enforcement

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-24 12:07:52
587Information society / Internet activism / Technology / Legal aspects of computing / Berkman / Center for Internet and Society / William W. Fisher / Harvard Law School / Massachusetts / Computer law / Cyberspace / Harvard University

Monday June 15 8h30 General welcome session (all summer schools) MR060

Add to Reading List

Source URL: www.genevasummerschools.ch

Language: English - Date: 2015-05-26 11:37:12
588Electronic warfare / Hacking / Military technology / Computer security / United States Department of Homeland Security / Idaho / Idaho National Laboratory / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Public safety / Cyberwarfare

2014 Annual ACSC Conference LEFT OF BOOM How and Where to Invest Across the Kill Chain

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2014-12-30 11:22:29
589

IKT.NRW SCHRIFTENREIHE Die Studie "Cyber Physical Devices – Die Schnittstelle zwischen Cyberspace und realer Welt" erläutert die Herausforderungen und Chancen an den technischen Schnittstellen und den Mensch-Maschine

Add to Reading List

Source URL: cps-hub-nrw.de

Language: German - Date: 2015-01-26 04:52:59
    590Military acquisition / Business Transformation Agency / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Quadrennial Defense Review / Government

    Preparation of this report cost the Department of Defense a total of approximately $169,010 for the 2011 Fiscal Year. Generated onRefID: F-2ACBC83 at https://www.cape.osd.mil/costguidance/studycostworksheet_pr

    Add to Reading List

    Source URL: dcmo.defense.gov

    Language: English - Date: 2013-06-18 15:59:50
    UPDATE