Electronic warfare

Results: 1516



#Item
481Computer security / Electronic warfare / Hacking / Military technology / Stuxnet / Rootkit / Malware / Advanced persistent threat / Hacker / Computing / Cyberwarfare / Security

Cyberwar, Advanced Persistent Threat and Cybercrime Modern Criminal Networks: Infrastructure and Tasks Segmentation

Add to Reading List

Source URL: www.isss.ch

Language: English - Date: 2011-04-08 06:20:28
482Electronic warfare / Military technology / Cyberwarfare / Phishing / Malware / Compass / Cybercrime / Computer crimes / Hacking

CYBERWAR Ivan Bütler Compass Security AG www.csnc.ch

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:42
483Cyberwarfare / Electronic warfare / Military technology / Audit committee / Audit / International Multilateral Partnership Against Cyber Threats / War / Military science / Business / Computer crimes / Auditing / Corporations law

FTSE 350 Cyber Governance Health Check: Tracker Report

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-01-28 10:44:12
484Computer crimes / United States Department of Homeland Security / Electronic warfare / Hacking / Military technology / Cyberwarfare / Resilience / Critical infrastructure protection / Psychological resilience / National security / Public safety / Emergency management

Insight Report Risk and Responsibility in a Hyperconnected World In collaboration with McKinsey & Company

Add to Reading List

Source URL: reports.weforum.org

Language: English - Date: 2014-01-17 04:45:59
485Computer crimes / Electronic warfare / Hacking / Military technology / Phishing / War / Malware / Stuxnet / Computer insecurity / Cybercrime / Cyberwarfare / Technology

ICS Defense Use Case (DUC) Dec 30, 2014 Authors: Robert M. Lee Michael J. Assante Tim Conway

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2014-12-30 15:02:01
486Electronic warfare / Security / Military technology / Computer security / Crime / Department of Defense Cyber Crime Center / Cyber-security regulation / Computer crimes / Cyberwarfare / Hacking

Special Issue on Solutions for Society - Creating a Safer and More Secure Society For the security and safety of critical infrastructure Cyber Security Factory - Our Commitment to Help Developing More Effective Methods

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2015-01-20 23:46:32
487Electronic warfare / Hacking / Military technology / Carnegie Mellon University / Computer emergency response team / Cyberwarfare / Luxembourg / Computer security / .lu / Political geography / International relations / Europe

Newsletter N°[removed]NEWSLETTER N°[removed]Information about the procedure of data acquisition in case of a cyber-attack and some recommendations. FROM A CYBER-ATTACK TO DATA ACQUISITION

Add to Reading List

Source URL: www.restena.lu

Language: English - Date: 2014-05-06 02:46:57
488Security / Software testing / Computer network security / Electronic warfare / Military technology / Physical security / SCADA / Vulnerability / Attack / Cyberwarfare / Computer security / Hacking

ICS Defense Use Case (DUC) Dec 20, 2014 Authors: Robert M. Lee Michael J. Assante Tim Conway

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2014-12-22 13:11:05
489United States Department of Homeland Security / Computer crimes / War / Infrastructure / Cyberterrorism / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Critical infrastructure / Information warfare / Cyberwarfare / National security / Security

Journal of Information Technology & Politicsä eHAWORTH® Electronic Text is provided AS IS without warranty of any kind. The Haworth Press, Inc. further disclaims all implied warranties

Add to Reading List

Source URL: www.css.ethz.ch

Language: English - Date: 2014-01-17 09:49:35
490Military technology / Cyberwarfare / Military science / War / Crime / Internet-related prefixes / Cyber-security regulation / Cooperative Cyber Defence Centre of Excellence / Computer crimes / Electronic warfare / Hacking

The UK Cyber Security Strategy December 2014 OBJECTIVE 1 MAKING THE UK ONE OF THE MOST SECURE PLACES IN THE WORLD TO DO BUSINESS ONLINE

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-12-11 07:52:10
UPDATE