Cyberspace

Results: 2446



#Item
801Hacking / Military technology / National security / Cyberwarfare / Computer security / Phishing / Malware / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cybercrime / Computer crimes / Electronic warfare

POLICY |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| THE NEW PARADIGM IN CYBER SECURITY KEVIN R. BROCK AND DAVID X. MARTIN

Add to Reading List

Source URL: www.centerforfinancialstability.org

Language: English - Date: 2014-03-06 14:13:06
802Military science / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / United States Computer Emergency Readiness Team / United States Cyber Command / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer security

A Human Capital Crisis in Cybersecurity CSIS CENTER FOR STRATEGIC & INTERNATIONAL STUDIES

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-07-20 11:14:44
803Government / United States Border Patrol / Public safety / U.S. Customs and Border Protection / United States Coast Guard / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Borders of the United States / National security / United States Department of Homeland Security

GAO-12-657T, BORDER SECURITY: Observations on the Costs and Benefits of a Department of Defense Role in Helping to Secure the Southwest Land Border

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2012-04-17 10:31:02
804Crime prevention / Law enforcement / National security / Information technology / Surveillance / Cyberspace / Digital divide / Fingerprint / Technological convergence / Technology / Security / Public safety

Amid the riot of this glossolalia, one can only focus on so much at a time, but what stands out here is the invocation of discourse as a barrage of flourishes, "rococo exchanges" against which the speaker puts up no figh

Add to Reading List

Source URL: davidbuuck.com

Language: English - Date: 2010-10-25 14:19:38
805IPv6 / Internet standards / IP address / Classless Inter-Domain Routing / IPv4 / IPv6 deployment / DIVI Translation / IPv4 address exhaustion / Network architecture / Internet Protocol / Internet

Feature The Rise of IPv6 Benefits and Costs of Transforming Military Cyberspace Dr. Panayotis A. Yannakogeorgos Maintaining awareness of advancing technology and harvesting the opportunities it creates is in our blood a

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2015-02-25 10:33:55
806Web 2.0 / Legal aspects of computing / Cyberspace Law and Policy Centre / UNSW Faculty of Law / Computing / Law school / Law review / World Wide Web / Internet / University of New South Wales / Neologisms / Social information processing

Law in the Information Age 2.0 GENLLAWS 3431 SummerV1 Statement of objectives and assessment [GENL 0230 was an earlier 3 unit course, now no longer offered. GENL 0231 is the new 6 unit

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:26:50
807Criminal law / Computer law / International Cybercrime / Convention on Cybercrime / Crimes Act / Computer crime / Legal aspects of computing / Theft / Cyberstalking / Computer crimes / Law / Crimes

06 - Cyberspace Law materials - Crime PageCyberspace Law materials - Crime

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2013-12-09 02:25:53
808Jurisdiction / Contract law / Legal documents / Tort law / Disclaimer / Competition and Consumer Act / Personal jurisdiction / Consumer protection / Conflict of property laws / Law / Private law / Conflict of laws

Jurisdictional Issues and Consumer Protection in Cyberspace: The View from “Down Under” Lee A Bygrave & Dan Svantesson [Paper presented at conference entitled “Cyberspace Regulation: eCommerce and Content”, Grace

Add to Reading List

Source URL: folk.uio.no

Language: English - Date: 2001-06-25 06:31:22
809United States Department of Homeland Security / Security engineering / Internet in the United States / Cyber-security regulation / Critical infrastructure protection / Computer security / ICANN / Information warfare / National Strategy to Secure Cyberspace / Cyberwarfare / National security / Security

FOR IMMEDIATE RELEASE Ann Patterson, (Greg Rattray to Lead BITS Security Program Washington, D.C.— September 7, 2010— BITS, the technology policy division of The Financial Services Roundtable, announced

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:09
810Legal aspects of computing / William Gummow / Legal education / Higher education / Cyberspace Law and Policy Centre / University of New South Wales / UNSW Faculty of Law / Law

Lim Yee Fen Nanyang Technological University Professor Lim graduated with degrees in Computer Science and in Law with Honours from the University of Sydney, Australia. She is an Associate Professor at the Division of Bus

Add to Reading List

Source URL: 2011.rigf.asia

Language: English - Date: 2011-12-23 22:25:37
UPDATE