Cyberspace

Results: 2446



#Item
631Computing / Social media / Community websites / Blog hosting services / Social networking service / LinkedIn / Facebook / Myspace / Internet privacy / World Wide Web / Social information processing / Web 2.0

COMMENTARY Cyberspace Odyssey W

Add to Reading List

Source URL: hubmagazine.com

Language: English - Date: 2014-07-18 23:40:12
632Hacking / Military technology / Military science / Cyberspace / War / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / United States Department of Homeland Security / Electronic warfare

FACT SHEET ON PRESIDENTIAL POLICY DIRECTIVE 20 ● The President recently signed a classified Presidential directive relating to cyber operations. ● Because the policy is classified, we cannot discuss all of the eleme

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2013-04-19 15:55:21
633Internet Protocol / Internet standards / IPv6 packet / IP fragmentation / Internet protocols / IPv4 / Ip / ICMPv6 / Transmission Control Protocol / Network architecture / Internet / IPv6

Attacking IPv6 Implementation Using Fragmentation Antonios Atlasis Centre for Strategic Cyberspace + Security Science Abstract

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:05
634Cyberspace Law and Policy Centre / UNSW Faculty of Law / Internet privacy / Legal aspects of computing / University of New South Wales / Ethics / Privacy

Microsoft Word - Symposium_Program_Distribution_2Oct_v3.doc

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2008-10-01 06:13:45
635Denial-of-service attack / Internet Relay Chat / National Police Agency / Cyberspace / Cyberwarfare / Denial-of-service attacks / Computer network security

Check your zombie devices! Analysis of the DDoS cyber terrorism against the country and future attacks on various devices DongJoo Ha, SangMyung Choi, TaeHyung Kim, SeungYoun Han Hauri & Issuemakerslab

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:37
636International Telecommunication Union / United States Department of Homeland Security / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / Information Technology Industry Council / Computer security / National Cybersecurity Center / National security / Cyberspace / Cyberwarfare / Security / Computer crimes

Federal Register / Vol. 80, NoThursday, March 19, Notices The meeting will be held on Monday, April 13, 2015, from 1:30 p.m.

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2015-03-19 12:08:23
637Communication / Media technology / Virtual reality / Cognition / Creativity / Educational psychology / Complexity / Free will / Control / Science / Philosophy / Knowledge

The Value of being Unmanageable: Variety and Creativity in CyberSpace Ranulph Glanville CybernEthics Research® 52, Lawrence Road, Southsea Hants, PO5 1NY

Add to Reading List

Source URL: www.univie.ac.at

Language: English - Date: 1999-07-16 07:34:06
638Crime / Hacking / Legion of Doom / The Hacker Crackdown / Computer crimes / Cyberspace / Hacker / Craig Neidorf / Phrack / Computing / Cybercrime / Phreaking

LITERARY FREEWARE — Not for Commercial Use by Bruce Sterling <> Sideways PDF version 0.1 by E-Scribe <>

Add to Reading List

Source URL: www.hacker-ethik.de

Language: English - Date: 2014-01-18 06:48:12
639Identification / ISO standards / Ubiquitous computing / Medicare card / Health and social services access card / Australia Card / Identity document / Smart card / National identification number / Healthcare in Australia / Technology / Security

Quacking like a duck: The national ID Card proposalcompared with the Australia CardGraham Greenleaf, Co-Director, Cyberspace Law & Policy Centre, Faculty of Law, UNSW 12 June 2006

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:29:20
640Government / Identity document / Security / Identification

The Naked Exposure Draft - ‘Is that an ID card you have in your pocket’? Graham Greenleaf Professor of Law, UNSW Co-Director, Cyberspace Law & Policy Centre

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:33:29
UPDATE