Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Saved in:
Corporate Authors: | National Research Council (U.S.). Committee on Offensive Information Warfare, National Research Council (U.S.). Computer Science and Telecommunications Board, National Research Council (U.S.). Division on Engineering and Physical Sciences, ebrary, Inc |
---|---|
Other Authors: | Dam, Kenneth W., Lin, Herbert, Owens, William A., 1940- |
Format: | Electronic eBook |
Language: | English |
Published: |
Washington, DC :
National Academies Press,
c2009.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyberdeterrence and cyberwar
by: Libicki, Martin C.
Published: (2009)
by: Libicki, Martin C.
Published: (2009)
Wars of disruption and resilience cybered conflict, power, and national security /
by: Demchak, Chris C.
Published: (2011)
by: Demchak, Chris C.
Published: (2011)
China's cyberwarfare capability
Published: (2010)
Published: (2010)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
by: Paul, Christopher, 1971-, et al.
Published: (2014)
by: Paul, Christopher, 1971-, et al.
Published: (2014)
Introduction to cyber-warfare a multidisciplinary approach /
by: Shakarian, Paulo
Published: (2013)
by: Shakarian, Paulo
Published: (2013)
Cyber blockades /
by: Russell, Alison Lawlor
Published: (2014)
by: Russell, Alison Lawlor
Published: (2014)
Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy /
Published: (2010)
Published: (2010)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Cyber security /
Published: (2014)
Published: (2014)
Cyber security and resiliency policy framework /
Published: (2014)
Published: (2014)
Crisis and escalation in cyberspace /
by: Libicki, Martin C.
Published: (2012)
by: Libicki, Martin C.
Published: (2012)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Cybersecurity today and tomorrow pay now or pay later /
Published: (2002)
Published: (2002)
Cyber warfare : techniques, tactics and tools for security practitioners /
by: Andress, Jason
Published: (2014)
by: Andress, Jason
Published: (2014)
Redefining information warfare boundaries for an Army in a wireless world
by: Porche, Isaac, 1968-
Published: (2013)
by: Porche, Isaac, 1968-
Published: (2013)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
by: Cordesman, Anthony H.
Published: (2002)
by: Cordesman, Anthony H.
Published: (2002)
Toward a safer and more secure cyberspace
Published: (2007)
Published: (2007)
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Published: (2014)
Published: (2014)
Cyber security and IT infrastructure protection /
Published: (2014)
Published: (2014)
The defendeŕs dilemma : charting a course toward cybersecurity /
by: Libicki, Martin C., et al.
Published: (2015)
by: Libicki, Martin C., et al.
Published: (2015)
A cyberworm that knows no boundaries
by: Porche, Isaac, 1968-
Published: (2011)
by: Porche, Isaac, 1968-
Published: (2011)
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
Cyber risks for business professionals a management guide /
by: Kendrick, Rupert
Published: (2010)
by: Kendrick, Rupert
Published: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
by: Mehan, Julie E.
Published: (2008)
by: Mehan, Julie E.
Published: (2008)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published: (2015)
Published: (2015)
Information warfare /
by: Ventre, Daniel
Published: (2016)
by: Ventre, Daniel
Published: (2016)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published: (2015)
Published: (2015)
Windows forensic analysis DVD toolkit, /
by: Carvey, Harlan A.
Published: (2007)
by: Carvey, Harlan A.
Published: (2007)
Aspects of network and information security
Published: (2008)
Published: (2008)
Identity management concepts, technologies, and systems /
by: Bertino, Elisa
Published: (2011)
by: Bertino, Elisa
Published: (2011)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Unauthorised access physical penetration testing for IT security teams /
by: Allsopp, Wil
Published: (2009)
by: Allsopp, Wil
Published: (2009)
Similar Items
-
Cyberdeterrence and cyberwar
by: Libicki, Martin C.
Published: (2009) -
Wars of disruption and resilience cybered conflict, power, and national security /
by: Demchak, Chris C.
Published: (2011) -
China's cyberwarfare capability
Published: (2010) -
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
by: Paul, Christopher, 1971-, et al.
Published: (2014) -
Introduction to cyber-warfare a multidisciplinary approach /
by: Shakarian, Paulo
Published: (2013)