Information warfare

Results: 1027



#Item
51Multiplexing / Radio resource management / Military communications / Cyberwarfare / Military technology / Electronic counter-countermeasures / Spread spectrum / Electronic warfare / Frequency-hopping spread spectrum / Telecommunications engineering / Military science / OSI protocols

Chapter 16: Electronic and Information Warfare C H A P TE R 16 Electronic and Information

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-09-07 03:18:44
52Espionage / Cyberwarfare / Military technology / Cryptography / Multiplexing / Electronic counter-countermeasures / Electronic warfare / Traffic analysis / Signals intelligence / Military science / Military communications / Telecommunications engineering

CHAPTER 19 Electronic and Information Warfare All warfare is based on deceptionhold out baits to entice the enemy. Feign

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:51:56
53224th Joint Communications Support Squadron / Joint Information Operations Warfare Center / Joint Enabling Capabilities Command / United States Transportation Command / Unified Combatant Command

Joint Enabling Capabilities Command The U.S. Transportation Command (USTRANSCOM) Joint Enabling Capabilities Command (JECC) provides mission-tailored, joint capability packages to combatant commanders in order to facilit

Add to Reading List

Source URL: www.jecc.mil

Language: English - Date: 2015-03-24 12:29:20
54Smartphones / Keyport /  Washington / Naval Undersea Warfare Center / Symbian / System software / Software / Computer architecture / Naval Surface Warfare Center / Naval Sea Systems Command

McLaughlin Research Corporation Proprietary Information Field

Add to Reading List

Source URL: www.rite-solutions.com

Language: English - Date: 2014-01-15 12:39:46
55Military science / Information operations / Mind control / Critical thinking / Public opinion / Nottingham Two / Terrorism / Strategic communication / Political warfare / Psychological warfare / War / Propaganda

5 ProPaganda and TerrorisM david Miller and rizwaan sabir David Miller and Rizwaan Sabir take a very different approach to Seib in the previous chapter and equate public diplomacy, strategic

Add to Reading List

Source URL: sttpml.org

Language: English - Date: 2014-04-09 14:57:20
56Military technology / Military organization / Military / Cyberwarfare / Net-centric / United States Cyber Command / Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / Electronic warfare / Hacking

Sustaining U.S. Global Leadership: Priorities for 21st Century Defense “Modern armed forces cannot conduct high-tempo, effective operations without reliable information and communication networks and assured access to

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2012-12-04 15:56:47
57E-learning / Simulation / Forsvarets Spesialkommando / Knowledge / Education / Space / Space and Naval Warfare Systems Command

FSK Technology Services, Inc. Subcontractor Information for entry on “Additional SeaPort Enhanced Team Member Request Form” (located online at http://www.seaport.navy.mil/main/sell/team_member_request.html) Proposed

Add to Reading List

Source URL: www.rite-solutions.com

Language: English - Date: 2014-08-07 08:31:40
58Cyberwarfare / Military science / War / Computer crimes / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Electronic warfare / Hacking / Military technology

The Danish Cyber and Information Security Strategy Danish Centre for Cyber Security Tobias Liebetrau – Head of Section Danish National Cyber and Information Security Strategy

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:23:12
59Anticipatory thinking / Bioterrorism / Futurology / Simulation / Anthrax attacks / Human decontamination / Security / Biological warfare / Terrorism / Prevention

1 Information Technologies for Civilian Bioterrorism Response Paul Y. Oh, Ruifeng Zhang, Charles Mode and Sherri Jurgens Drexel University, Philadelphia PA 19104

Add to Reading List

Source URL: prism2.mem.drexel.edu

Language: English - Date: 2008-10-12 15:57:37
60Human resource management / Enterprise architecture / Knowledge / Information / Science / Military terminology / Signals intelligence / Unmanned aerial vehicle

EXECUTIVE SUMMARY Context The Global War on Terror (GWOT) shifted the military emphasis from traditional warfare to irregular warfare. Traditional warfare focused primarily on having the force structure needed to destro

Add to Reading List

Source URL: seari.mit.edu

Language: English - Date: 2008-08-27 16:51:45
UPDATE