Cyberspace

Results: 2446



#Item
601

New gTLDs – neue Adressen im Cyberspace Alexander Schmid Die Einführung von neuen Generic Top Level Domains (kurz gTLD) steht kurz bevor. Unternehmen stehen vor der Frage, wie damit umzugehen ist. Sollen beispielsweis

Add to Reading List

Source URL: epartners.ch

Language: German - Date: 2015-05-19 14:41:28
    602Defense Logistics Agency / United States Department of Defense / National security / Government / United States Department of Homeland Security / United States / U.S. Department of Defense Strategy for Operating in Cyberspace / United States government secrecy / Sensitive but unclassified / Government procurement in the United States

    DETERMINATION OF THE DIRECTOR OF ADMINISTRATION I have determined that the following information is exempt from disclosure under Exemption 3 of the Freedom of Information Act (5 U.S.C. § 552(b)(3)) because it meets the

    Add to Reading List

    Source URL: open.defense.gov

    Language: English - Date: 2015-04-29 07:15:32
    603Data security / National security / Public safety / Information security / Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

    Cyber Security Strategy in Sweden – work in progress  Briefing at the 2nd ENISA National Cyber Security Strategies Workshop, Riga, 150513 Swedish Government Administration

    Add to Reading List

    Source URL: resilience.enisa.europa.eu

    Language: English - Date: 2015-05-18 07:13:45
    604Military technology / Military organization / Military / Cyberwarfare / Net-centric / United States Cyber Command / Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / Electronic warfare / Hacking

    Sustaining U.S. Global Leadership: Priorities for 21st Century Defense “Modern armed forces cannot conduct high-tempo, effective operations without reliable information and communication networks and assured access to

    Add to Reading List

    Source URL: www.defenseinnovationmarketplace.mil

    Language: English - Date: 2012-12-04 15:56:47
    605

    IKT.NRW SCHRIFTENREIHE Die Studie "Cyber Physical Devices – Die Schnittstelle zwischen Cyberspace und realer Welt" erläutert die Herausforderungen und Chancen an den technischen Schnittstellen und den Mensch-Maschine

    Add to Reading List

    Source URL: www.cps-hub-nrw.de

    Language: German - Date: 2015-01-26 04:52:59
      606Computing / Computer law / Digital rights management / Proprietary software / Copy protection / Copyright infringement of software / Copyright / Software copyright / Free software / Law / Software licenses / Copyright law

      CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-12-05 05:54:34
      607Cyberwarfare / Military science / War / Computer crimes / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Hacking / Military technology

      The Danish Cyber and Information Security Strategy Danish Centre for Cyber Security Tobias Liebetrau – Head of Section Danish National Cyber and Information Security Strategy

      Add to Reading List

      Source URL: resilience.enisa.europa.eu

      Language: English - Date: 2015-05-18 07:23:12
      608Military technology / Cyberwarfare / Military science / War / Crime / Cyberspace / Internet governance / Internet-related prefixes / International Multilateral Partnership Against Cyber Threats / Computer crimes / Electronic warfare / Hacking

      CYFY 2014 16th & 17th October VOLUME II ISSUE 11

      Add to Reading List

      Source URL: cyfy.org

      Language: English - Date: 2014-11-06 00:27:27
      609Computer law / Electronic Privacy Information Center / Internet privacy / Personally identifiable information / Computer security / Freedom of Information Act / Privacy / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Ethics / Security / Government

      COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60] Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities

      Add to Reading List

      Source URL: epic.org

      Language: English - Date: 2012-07-11 12:09:35
      610Intellectual property law / Plagiarism / Computer law / United Kingdom copyright law / Copyright / Monopoly / Public domain / Creative Commons / Moral rights / Law / Copyright law / Civil law

      Beyond Creative Commons: Seeing copyright’s public domain as a whole (An Australian case study) Graham Greenleaf Professor of Law, University of New South Wales Co-Director, Cyberspace Law & Policy Centre 1.

      Add to Reading List

      Source URL: www.cyberlawcentre.org

      Language: English - Date: 2013-12-09 02:36:05
      UPDATE