Redefining information warfare boundaries for an Army in a wireless world
Enregistré dans:
Auteur principal: | Porche, Isaac, 1968- |
---|---|
Collectivités auteurs: | Arroyo Center, ebrary, Inc |
Autres auteurs: | Paul, Christopher, 1971- |
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Santa Monica, Calif. :
RAND,
[2013]
|
Collection: | Rand Corporation monograph series.
|
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
China's cyberwarfare capability
Publié: (2010)
Publié: (2010)
A cyberworm that knows no boundaries
par: Porche, Isaac, 1968-
Publié: (2011)
par: Porche, Isaac, 1968-
Publié: (2011)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publié: (2009)
Publié: (2009)
Cyberdeterrence and cyberwar
par: Libicki, Martin C.
Publié: (2009)
par: Libicki, Martin C.
Publié: (2009)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
par: Cordesman, Anthony H.
Publié: (2002)
par: Cordesman, Anthony H.
Publié: (2002)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
par: Paul, Christopher, 1971-, et autres
Publié: (2014)
par: Paul, Christopher, 1971-, et autres
Publié: (2014)
The new era in U.S. national security : an introduction to emerging threats and challenges /
par: Jarmon, Jack A., 1951-
Publié: (2014)
par: Jarmon, Jack A., 1951-
Publié: (2014)
Cyber security /
Publié: (2014)
Publié: (2014)
Cyber security and resiliency policy framework /
Publié: (2014)
Publié: (2014)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
par: Winterfeld, Steve
Publié: (2013)
par: Winterfeld, Steve
Publié: (2013)
Wars of disruption and resilience cybered conflict, power, and national security /
par: Demchak, Chris C.
Publié: (2011)
par: Demchak, Chris C.
Publié: (2011)
Cyber conflict competing national perspectives /
par: Ventre, Daniel
Publié: (2012)
par: Ventre, Daniel
Publié: (2012)
Advances in cyber security : technology, operations, and experiences /
Publié: (2013)
Publié: (2013)
Force multiplying technologies for logistics support to military operations /
Publié: (2014)
Publié: (2014)
Cybersecurity today and tomorrow pay now or pay later /
Publié: (2002)
Publié: (2002)
Quadrennial defense review assessing U.S. defense and security /
Publié: (2011)
Publié: (2011)
Introduction to communication electronic warfare systems
par: Poisel, Richard
Publié: (2002)
par: Poisel, Richard
Publié: (2002)
Terrorism, asymmetric warfare, and weapons of mass destruction defending the U.S. homeland /
par: Cordesman, Anthony H.
Publié: (2002)
par: Cordesman, Anthony H.
Publié: (2002)
Introduction to cyber-warfare a multidisciplinary approach /
par: Shakarian, Paulo
Publié: (2013)
par: Shakarian, Paulo
Publié: (2013)
Striking first preemptive and preventive attack in U.S. national security policy /
Publié: (2006)
Publié: (2006)
Lifting the fog of peace how Americans learned to fight modern war /
par: Davidson, Janine
Publié: (2010)
par: Davidson, Janine
Publié: (2010)
Commercial multimedia technologies for twenty-first century army battlefields a technology management strategy /
Publié: (1995)
Publié: (1995)
America's strategic choices
Publié: (2000)
Publié: (2000)
U.S. defense policy.
Publié: (1983)
Publié: (1983)
Real security : restoring American power in a dangerous decade /
par: Barnet, Richard J.
Publié: (1981)
par: Barnet, Richard J.
Publié: (1981)
Security in a changing world case studies in U.S. national security management /
Publié: (2002)
Publié: (2002)
Under the eagle's wing a national security strategy of the United States for 2009 /
par: Hart, Gary
Publié: (2008)
par: Hart, Gary
Publié: (2008)
Strategic advantage challengers, competitors, and threats to America's future /
par: Berkowitz, Bruce D., 1956-
Publié: (2008)
par: Berkowitz, Bruce D., 1956-
Publié: (2008)
The long war a new history of U.S. national security policy since World War II /
Publié: (2007)
Publié: (2007)
American national security
Publié: (2009)
Publié: (2009)
Unending crisis national security policy after 9/11 /
par: Graham, Thomas, 1933-
Publié: (2012)
par: Graham, Thomas, 1933-
Publié: (2012)
New directions in U.S. national security strategy, defense plans, and diplomacy : a review of official strategic documents /
par: Kugler, Richard L.
Publié: (2011)
par: Kugler, Richard L.
Publié: (2011)
The modern American military
Publié: (2013)
Publié: (2013)
Irrational security the politics of defense from Reagan to Obama /
par: Wirls, Daniel, 1960-
Publié: (2010)
par: Wirls, Daniel, 1960-
Publié: (2010)
No use : nuclear weapons and U.S. national security /
par: Nichols, Thomas M., 1960-
Publié: (2014)
par: Nichols, Thomas M., 1960-
Publié: (2014)
Army science and technology for homeland security.
Publié: (2004)
Publié: (2004)
Science and technology for army homeland security.
Publié: (2003)
Publié: (2003)
Learning large lessons the evolving roles of ground power and air power in the post-Cold War era /
par: Johnson, David E. (David Eugene), 1950-
Publié: (2006)
par: Johnson, David E. (David Eugene), 1950-
Publié: (2006)
Orchestrating the instruments of power : a critical examination of the U.S. national security system /
par: Worley, D. Robert (Duane Robert), 1949-
Publié: (2015)
par: Worley, D. Robert (Duane Robert), 1949-
Publié: (2015)
Cybercrime and cyberwarfare /
par: Bernik, Igor
Publié: (2014)
par: Bernik, Igor
Publié: (2014)
Documents similaires
-
China's cyberwarfare capability
Publié: (2010) -
A cyberworm that knows no boundaries
par: Porche, Isaac, 1968-
Publié: (2011) -
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publié: (2009) -
Cyberdeterrence and cyberwar
par: Libicki, Martin C.
Publié: (2009) -
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
par: Cordesman, Anthony H.
Publié: (2002)