Electronic warfare

Results: 1516



#Item
201Security / Electronic warfare / Hacking / Military technology / War / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / United States Department of Homeland Security / Computer crimes / Cyberwarfare / Computer security

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-03-20 13:00:34
202Hacking / Military technology / Diplomacy / Cyberwarfare / Computer crimes / International relations / Military science / United Nations Institute for Disarmament Research / United Nations Office at Nairobi / Electronic warfare

International Law and State Behaviour in Cyberspace Series Africa Regional Seminar 3-4 March 2015 Room 10, United Nations Office at Nairobi, Nairobi, Kenya Organized by the United Nations Institute for Disarmament Resear

Add to Reading List

Source URL: www.unidir.org

Language: English - Date: 2015-03-13 06:35:34
203Military / Cyberinfrastructure / Net-centric / United States Cyber Command / Hacking / Military technology / United States Strategic Command / Information assurance vulnerability alert / Cyberwarfare / Military organization / Military science / Electronic warfare

PDF Document

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-10 10:33:24
204Electronic warfare / Hacking / Military technology / Public safety / Military science / Computer security / United States Department of Homeland Security / Idaho National Laboratory / National Cyber Security Division / Security / Computer crimes / Cyberwarfare

BACKGROUNDER No. 2785 | March 28, 2013 A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace Steven P. Bucci, PhD, Paul Rosenzweig, and David Inserra

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2013-04-01 13:12:31
205Cyberwarfare / Crime / Electronic warfare / Hacking / Military technology / Data breach / Identity theft / Computer security / Computer crime / Security / Computer network security / Secure communication

2014 DATA BREACH INVESTIGATIONS REPORT INSIDER MISUSE DOS ATTACKS

Add to Reading List

Source URL: jolt.richmond.edu

Language: English - Date: 2015-03-16 13:16:05
206Hacking / Military technology / Military / War / United States Cyber Command / Georgia Tech Research Institute / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Military science / Electronic warfare

Offensive Cyber Capabilities at the Operational Level: The Way Ahead

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-09-16 10:52:11
207Computer crimes / Electronic warfare / Military technology / Computer law / Electronics / Cyberwarfare / ICANN / Internet governance / Network neutrality / Internet / Computing / Hacking

CYFY 2014 16th & 17th October VOLUME II ISSUE 12

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-12-08 06:12:35
208War / Information operations / Electronic warfare / Hacking / Military technology / IWar / Information warfare / United States Military Academy / United States Air Force Academy / Military science / Colorado counties / Cyberwarfare

THE CYBER DEFENSE EXERCISE: AN EVALUATION OF THE EFFECTIVENESS OF INFORMATION ASSURANCE EDUCATION Wayne J. Schepens National Security Agency Information Technology Operations Center United States Military Academy

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
209Cyberwarfare / War / Electronic engineering / Military science / Electromagnetism / Rajiv Gandhi National Cyber Law Center / Electronic warfare / Hacking / Military technology

Electronics with cyber security what? It does

Add to Reading List

Source URL: www.smallpeicetrust.org.uk

Language: English - Date: 2015-04-09 09:36:36
210Hacking / Booz Allen Hamilton / Cyberwarfare / Malware / War / Military science / Advanced persistent threat / Computer security / Electronic warfare

Countering Advanced Persistent Threats: A Strategic Approach to a Growing Danger

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-28 01:21:07
UPDATE