Cyberwarfare in the United States

Results: 459



#Item
51Internet in the United States / ICANN / United States Department of Commerce / Internet standards / DNS root zone / Regional Internet registry / .co / Cyberwarfare / .mobi / Internet / Internet governance / Domain name system

CYFY 2014 16th & 17th October VOLUME II ISSUE 7

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-07-07 08:03:18
52Computer crimes / Security / Cyberwarfare / Electronic warfare / Military technology / United States Cyber Command / Cyber spying / World Summit on the Information Society / Cyberwarfare in the United States / Cybercrime / Hacking / National security

CYFY 2014 16th & 17th October VOLUME II ISSUE 5

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-05-02 07:39:52
53Energy development / Energy economics / Law enforcement in the United States / Critical infrastructure protection / Nuclear terrorism / Energy security / United States Department of Homeland Security / Cyberwarfare / Port security / National security / Security / Public safety

WORKING DOCUMENT PROTECTING AMERICA’S CRITICAL ENERGY

Add to Reading List

Source URL: www.terrorism.com

Language: English - Date: 2012-02-04 12:13:41
54Bipartisan Policy Center / Radicalization / 9/11 Commission / United States Department of Homeland Security / Cyberwarfare / Henry L. Stimson Center / Public administration / Government / Politics of the United States / Violent Radicalization and Homegrown Terrorism Prevention Act

National Security Program Homeland Security Project Countering Online Radicalization in America

Add to Reading List

Source URL: bipartisanpolicy.org

Language: English - Date: 2014-11-13 04:20:45
55Hacking / Military technology / Computer security / War / National security / Melissa Hathaway / Internet-related prefixes / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

CNA_logo_4color-whiteoutline_whitetext.eps

Add to Reading List

Source URL: www.cnas.org

Language: English - Date: 2014-07-21 12:12:39
56Computer crimes / Abuse / Fear / Counter-terrorism / Cyberterrorism / Cyberwarfare / Geneva Centre for Security Policy / United States Department of Homeland Security / National Strategy to Secure Cyberspace / National security / Terrorism / Security

Program on the Geopolitical Implications of Globalization and Transnational Security GCSP Policy Brief Series The GCSP policy brief series publishes papers in order to assess policy challenges, dilemmas, and policy recom

Add to Reading List

Source URL: www.gcsp.ch

Language: English
57United States Department of Homeland Security / Cyberwarfare / Stockpile stewardship / Nuclear warfare / Nuclear Threat Initiative / Nuclear power / Weapon of mass destruction / Lawrence Livermore National Laboratory / DHS Directorate for Science and Technology / Nuclear weapons / Energy / Technology

National Security: Protecting Our Country, Our People Since leading America’s successful effort to develop nuclear weapons in World War II, the U.S. Department of Energy’s National Laboratories have played a central

Add to Reading List

Source URL: www.pnnl.gov

Language: English - Date: 2015-04-03 15:06:02
58Hacking / Military technology / Crime / War / International Multilateral Partnership Against Cyber Threats / Military science / Cyberwarfare in the United States / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Electronic warfare

Bedrijfsrecherche - Consultancy & Opleidingen - ICT-Security ASSESSING CYBER SECURITY A META-ANALYSIS OF THREATS, TRENDS, AND RESPONSES TO CYBER ATTACKS

Add to Reading List

Source URL: hoffmannbv.nl

Language: English - Date: 2015-04-16 03:57:52
59Cyberwarfare / Computer security / Crimes / Identity theft / Theft / Malware / Data breach / Verizon Communications / Security / Computer network security / Secure communication

D ATA B R E A C H I N V E S T I G AT I O N S R E P O R T A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service. Executive Summary

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-06-21 20:00:00
60Computer crimes / United States Department of Homeland Security / Cyberwarfare / Military technology / Safety / International Multilateral Partnership Against Cyber Threats / Computer security / Critical infrastructure protection / Federal Aviation Administration / National security / Security / Air safety

The Connectivity Challenge: Protecting Critical Assets in a Networked World

Add to Reading List

Source URL: www.aiaa.org

Language: English - Date: 2013-08-13 11:49:40
UPDATE