Cyberwarfare in the United States

Results: 459



#Item
81Development / Digital media / World Summit on the Information Society / Cyberwarfare / International Telecommunication Union / Digital divide in the United States / Technology / Digital divide / Information society

Scenarios: ICTs for Peace and Conflict in 2020

Add to Reading List

Source URL: projectdanube.org

Language: English - Date: 2012-02-22 10:12:49
82United States Department of Homeland Security / Cyber-security regulation / Crime / Critical infrastructure protection / War / International Cybercrime / Computer crimes / Cyberwarfare / National security

CYBER MATURITY IN THE ASIA–PACIFIC REGION 2014

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-04-24 00:27:04
83Crime prevention / Security engineering / United States Department of Homeland Security / Computer security / Institute for Information Infrastructure Protection / Critical infrastructure protection / Information security / Cyberwarfare / Cyber-security regulation / Security / National security / Public safety

CTO Corner July 2013 R&D in the Financial Services Sector Dan Schutzer, CTO, BITS This column discusses the importance to our industry of investing in research directed at

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-07-02 17:52:02
84Computer network security / Computer security / Hacking / National security / United States Cyber Command / Attack / Computer crimes / Cyberwarfare / Security

OPINION PIECE Private and public sectors must pull in same direction to combat cyber crime TOBIAS FEAKIN The Weekend Australian, Defence Supplement, p4

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2013-10-09 20:40:11
85Network-centric warfare / Military communications / United States Cyber Command / Centricity / Defence Research and Development Organisation / Cyberwarfare / Information warfare / Network-enabled capability / Network Centric Operations Industry Consortium / Net-centric / Military science / Military

Guest Column | Lt General P.C. Katoch [retd] Knots and Crosses Without a CDS with full operational powers, net-centricity in the defence forces will continue to remain flawed Network Centric Warfare (NCW)

Add to Reading List

Source URL: www.forceindia.net

Language: English - Date: 2014-10-06 05:33:14
86Security / Cyberwarfare / Computer crimes / Electronic warfare / National security / Cyber spying / Hacker / Computer security / Cyberwarfare in the United States / Cybercrime / Hacking / Computing

[removed]Chinese hackers attack blue-chip groups via Forbes website - FT.com Home Africa

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-02-10 14:55:33
87Computer network security / Crime prevention / National security / Secure communication / Cyberspace / Military science / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer security

M a r c h[removed]cybersecurity challenges FOR CANADA AND THE UNITED STATES Alexander Moens

Add to Reading List

Source URL: www.fraserinstitute.org

Language: English - Date: 2015-03-02 12:26:23
88Security / Electronic warfare / Military technology / War / Computer security / Critical infrastructure / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / National security / United States Department of Homeland Security / Cyberwarfare

COMMUNICATIONS ALLIANCE LTD  Department of the Prime Minister and Cabinet Consultation Paper

Add to Reading List

Source URL: www.commsalliance.com.au

Language: English - Date: 2015-04-01 20:07:50
89Electronic warfare / Hacking / Military technology / Cyberterrorism / GhostNet / Cyber / Hacker / Cyberwarfare in the United States / Jeffrey Carr / Cybercrime / Cyberwarfare / Computer crimes

IEE-29MTS01-10-0109_Template

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2013-03-23 05:32:15
90National security / Electronic warfare / Hacking / Computer crimes / Military technology / United States Cyber Command / Cyber spying / Industrial espionage / Information Warfare Monitor / Cyberwarfare / Cybercrime / Espionage

Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-03-07 12:35:38
UPDATE