Electronic warfare

Results: 1516



#Item
151Electronic warfare / Hacking / Military technology / Contemporary history / Information operations / Information warfare / Cyberspace / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Military science / War

IRIE International Review of Information Ethics VolJürgen Altmann, Francesca Vidal:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2014-05-21 07:52:16
152Electronic warfare / Hacking / Military technology / Information security management system / Computer security / Transglobal Secure Collaboration Project / EBIOS / Security / National security / Cyberwarfare

COMMUNIQUÉ DE PRESSE - PRESS RELEASE

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-02-20 06:36:02
153Public safety / Computer security / Electronic warfare / Military technology / United States Department of Homeland Security / National Cyber Security Division / Security / Hacking / Cyberwarfare

What is the Cyber Hygiene Campaign? The Campaign, a joint effort of the Center for Internet Security (CIS) and the Governors Homeland Security Advisors Council (GHSAC), aims to create a nationwide movement toward measura

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2015-03-13 15:04:43
154Aircraft / Military organization / Boeing EA-18G Growler / United States Strategic Command / Electronic warfare / Lockheed Martin F-22 Raptor / Military acquisition / Airborne forces / Lockheed Martin F-35 Lightning II / Carrier-based aircraft / Stealth aircraft / Aviation

GAO, Airborne Electronic Attack: Achieving Mission Objectives Depends on Overcoming Acquisition Challenges

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2012-05-10 11:35:35
155Military technology / Crime prevention / Computer crimes / Cyberwarfare / War / Computer security / Department of Defense Cyber Crime Center / Security / Electronic warfare / Hacking

PRESS RELEASE TIER-3 TO SPONSOR CYBER SECURITY SUMMIT IN LONDON London, November 8, 2013: Tier-3, the creator of Huntsman Intelligent Security solutions for enterprise, announced today it will sponsor the 2013 Cyber Secu

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:37:57
156Radiobiology / Building biology / Heating /  ventilating /  and air conditioning / Air pollution / Dosimeters / Dosimetry / Indoor air quality / Ionizing radiation / Electronic Warfare Officer / Medicine / Physics / Health

Air Quality Assessment in Cultural Heritage Institutions Using EWO Dosimeters

Add to Reading List

Source URL: www.morana-rtd.com

Language: English - Date: 2014-08-22 08:33:57
157Hacking / Military technology / National security / Cyberwarfare / Military science / International Multilateral Partnership Against Cyber Threats / Computer security / Security management / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / Electronic warfare

Presentation of the Danish Cyber and Information Security Strategy_EN version

Add to Reading List

Source URL: www.fmn.dk

Language: English - Date: 2015-03-23 08:26:16
158Hacking / Military technology / Computer security / War / National security / Melissa Hathaway / Internet-related prefixes / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

CNA_logo_4color-whiteoutline_whitetext.eps

Add to Reading List

Source URL: www.cnas.org

Language: English - Date: 2014-07-21 12:12:39
159Electronic warfare / Hacking / Military technology / FireEye /  Inc. / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Cooperative Cyber Defence Centre of Excellence / Canadian government hackings / Cyber-security regulation / Cybercrime / Computer crimes / Cyberwarfare

Government Top Target for APT Attacks With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy no

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-05-01 06:24:02
160Military terminology / Electronic warfare / Hacking / Military technology / ISTAR / Battlespace / Cyberwarfare / Royal Air Force / Unmanned aerial vehicle / Military science / Military / Command and control

Defence Information Superiority Conference 2010 ‘Creating and Exploiting Decision Advantage’ Air Chief Marshal Sir Stephen Dalton, KCB ADC BSc FRAeS CCMI RAF Chief of the Air Staff Coming, as it does, in the midst of

Add to Reading List

Source URL: www.raf.mod.uk

Language: English - Date: 2010-07-07 04:54:10
UPDATE