Electronic warfare

Results: 1516



#Item
501Blog software / Content management systems / Hacking / WordPress / Electronic warfare / Cyberwarfare / Hacker / Software / Computing / PHP programming language

40 Million Websites Are Currently Vulnerable to Cyber Attack, a Recent Study by Creative Development Finds Creative Development found in study carried out during March that 80% of all WordPress installations are not runn

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2013-03-04 19:05:47
502Military technology / Computer network security / Cyberwarfare / Computer security / Malware / War / Security / Electronic warfare / Hacking

The Risk of an Uncertain Security Strategy Study of Global IT Practitioners in SMB Organizations Sponsored by Sophos Independently conducted by Ponemon Institute LLC Publication Date: November 2013

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2013-11-18 17:11:48
503Computer network security / Hacking / Computing / Military technology / United States Cyber Command / Attack / National Security Agency / Botnet / Cyberwarfare / Electronic warfare / Computer security

Kim Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller Independent Security Evaluators

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 14:17:10
504Inverse synthetic aperture radar / Identification friend or foe / Technology / Synthetic aperture radar / Anti-submarine warfare / Electronic engineering / AN/APY-10 / Radar / Sikorsky SH-60 Seahawk / Telecommunications engineering

AN/APS-153(V) Multi-Mode Radar The World’s Premier Surveillance Radar for Maritime Helicopters Advanced Technology With A Global Reach

Add to Reading List

Source URL: www.telephonics.com

Language: English - Date: 2013-10-23 11:36:01
505Electronic warfare / Hacking / Military technology / National security / Cyberwarfare / Computer security / Identity theft / Network security / Malware / Computer crimes / Crime / Security

PDF Document

Add to Reading List

Source URL: strategicstudiesinstitute.army.mil

Language: English - Date: 2013-05-01 09:13:09
506Department of Defense Strategy for Operating in Cyberspace / National security / Electronic warfare / Hacking / Military technology / Military / United States Cyber Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / Cyberwarfare / Computer crimes

Executive Summary Strategic Studies Institute and U.S. Army War College Press AN ASSESSMENT OF THE DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

Add to Reading List

Source URL: strategicstudiesinstitute.army.mil

Language: English - Date: 2013-09-23 11:12:24
507Electromagnetic compatibility / Electronic warfare / Electromagnetic pulse / Electromagnetism / Military technology / Technology / Lord Emp / Electromagnetic pulse in fiction and popular culture / Nuclear weapons / Energy weapons / Bombs

WebMemo 22 Published by The Heritage Foundation

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2009-11-20 17:48:10
508Cyberwarfare / Electronic warfare / Hacking / Military technology / Breast cancer awareness / National Breast Cancer Awareness Month / Computer security / Medicine / Health / Breast cancer

PROCLAMATION 8573—OCT. 1, [removed]STAT[removed]when it may be easier to treat. Women at higher risk of breast cancer should discuss with their health care providers whether they need

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-04-23 11:04:44
509Hacking / Military technology / Confidence and security-building measures / Diplomacy / National security / War / Cyberwarfare / Situation awareness / Computer security / Computer crimes / Security / Electronic warfare

AMBASSADOR (RET.) DANIEL STAUFFACHER, EDITOR CAMINO KAVANAGH, RAPPORTEUR CONFIDENCE BUILDING MEASURES AND INTERNATIONAL CYBER SECURITY

Add to Reading List

Source URL: f.cl.ly

Language: English - Date: 2013-07-15 08:36:22
510Electronic warfare / Hacking / Military technology / Classified information / For Official Use Only / Military science / Cyberwarfare / Operations security / United States Department of Homeland Security / National security / United States government secrecy / Security

UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade

Add to Reading List

Source URL: wlstorage.net

Language: English - Date: 1983-12-31 20:01:00
UPDATE