Electronic warfare

Results: 1516



#Item
741Military technology / Federal Trade Commission / Cyberwarfare / Competition law / War / Military science / Business / Second request / United States antitrust law / Electronic warfare / Hacking

Department of Justice Will Not Challenge Proposed Cyber Intelligence Data-Sharing Platform

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-10-03 11:58:47
742Cyberwarfare / Electronic warfare / Hacking / Military technology / Cyberspace / U.S. Army Cyber Command / Air Force Cyber Command / Defense Information Systems Agency / United States Tenth Fleet / United States Cyber Command / Military organization / Military science

CYBER BEACON 2014 Cyber Workforce Development, Education and Training Workshop National Defense University Fort Lesley J. McNair, Washington, DC[removed]July 2014

Add to Reading List

Source URL: icollege.ndu.edu

Language: English - Date: 2014-09-10 10:34:06
743Electronic warfare / Hacking / Military technology / Computer security / National security / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / United States Department of Homeland Security / Information security / Computer crimes / Security / Public safety

Business Review Request Letter: CyberPoint International (BR)

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-10-06 12:41:57
744War / Terrorism / Electronic warfare / Hacking / Military technology / Computer security / Cyberterrorism / Computer insecurity / Cyber-security regulation / Cyberwarfare / Security / Computer crimes

STRIKING THE BALANCE: SECURITY VS. UTILITY Ari Vidali, CEO ENVISAGE Technologies Corp. Presented to the NATO Advanced Research Workshop in Venice, Italy February 5-7, 2009

Add to Reading List

Source URL: www.envisagenow.com

Language: English - Date: 2014-04-25 09:38:55
745Computer security / Cyberwarfare / Electronic warfare / Military technology / Information security / Cyber-security regulation / Department of Defense Cyber Crime Center / Data security / Security / National security

Report based on discussions with the Security for Business Innovation Council t

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-01-24 09:53:54
746Military technology / Military / The Pentagon / United States Air Force / United States Department of Defense / Cyberwarfare / Cyberspace / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / Electronic warfare / Hacking

18 SEPTEMBER 2014 FOREWORD Since the Air Force’s founding, Airmen have led in development, integration, fielding and sustainment of cutting-edge weapon systems vital to the security of America and its allies. The abi

Add to Reading List

Source URL: www.safcioa6.af.mil

Language: English - Date: 2014-10-06 15:07:53
747United States / 315th Network Warfare Squadron / 381st Intelligence Squadron

Table 1. Joint Meritorious Unit Award – Approved DoD Activities The following table lists, by DoD activity and inclusive dates, the approved Joint Meritorious Unit Awards. DoD Activity Electronic Warfare During Close A

Add to Reading List

Source URL: prhome.defense.gov

Language: English - Date: 2014-09-23 14:06:33
748Cyberwarfare / Military technology / War / Security / Computer crime / Computer security / Idaho National Laboratory / Attack / Cyber / Electronic warfare / Hacking / Computer network security

The Electrical Grid as a Target for Cyber Attack James Andrew Lewis Center for Strategic and International Studies March 2010 The electrical power grid has gotten much attention in the last few years as a potential targe

Add to Reading List

Source URL: csis.org

Language: English - Date: 2010-03-22 10:30:01
749Military technology / Military science / Cyberspace / Cyberwarfare / Hacking / Electronic warfare

Women in Cyber Security Report July 2013 Roundtable report Women’s Security Society Email: [removed] www.womenssecuritysociety.co.uk

Add to Reading List

Source URL: www.womenssecuritysociety.co.uk

Language: English - Date: 2013-07-16 11:49:53
750Military technology / National security / War / Surveillance / Cyber-security regulation / National Security Agency / Cyberwarfare / Electronic warfare / Hacking

The Strategic Arms reduction Treaty (START) : An Historical Overview

Add to Reading List

Source URL: www.nato.int

Language: English - Date: 2013-06-28 10:43:14
UPDATE