Redefining information warfare boundaries for an Army in a wireless world
Na minha lista:
Autor principal: | Porche, Isaac, 1968- |
---|---|
Corporate Authors: | Arroyo Center, ebrary, Inc |
Outros Autores: | Paul, Christopher, 1971- |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Santa Monica, Calif. :
RAND,
[2013]
|
Colecção: | Rand Corporation monograph series.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
China's cyberwarfare capability
Publicado em: (2010)
Publicado em: (2010)
A cyberworm that knows no boundaries
Por: Porche, Isaac, 1968-
Publicado em: (2011)
Por: Porche, Isaac, 1968-
Publicado em: (2011)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publicado em: (2009)
Publicado em: (2009)
Cyberdeterrence and cyberwar
Por: Libicki, Martin C.
Publicado em: (2009)
Por: Libicki, Martin C.
Publicado em: (2009)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
Por: Cordesman, Anthony H.
Publicado em: (2002)
Por: Cordesman, Anthony H.
Publicado em: (2002)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
Por: Paul, Christopher, 1971-, et al.
Publicado em: (2014)
Por: Paul, Christopher, 1971-, et al.
Publicado em: (2014)
The new era in U.S. national security : an introduction to emerging threats and challenges /
Por: Jarmon, Jack A., 1951-
Publicado em: (2014)
Por: Jarmon, Jack A., 1951-
Publicado em: (2014)
Cyber security /
Publicado em: (2014)
Publicado em: (2014)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
Por: Winterfeld, Steve
Publicado em: (2013)
Por: Winterfeld, Steve
Publicado em: (2013)
Wars of disruption and resilience cybered conflict, power, and national security /
Por: Demchak, Chris C.
Publicado em: (2011)
Por: Demchak, Chris C.
Publicado em: (2011)
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013)
Publicado em: (2013)
Cyber conflict competing national perspectives /
Por: Ventre, Daniel
Publicado em: (2012)
Por: Ventre, Daniel
Publicado em: (2012)
Force multiplying technologies for logistics support to military operations /
Publicado em: (2014)
Publicado em: (2014)
Cybersecurity today and tomorrow pay now or pay later /
Publicado em: (2002)
Publicado em: (2002)
Quadrennial defense review assessing U.S. defense and security /
Publicado em: (2011)
Publicado em: (2011)
Terrorism, asymmetric warfare, and weapons of mass destruction defending the U.S. homeland /
Por: Cordesman, Anthony H.
Publicado em: (2002)
Por: Cordesman, Anthony H.
Publicado em: (2002)
Introduction to communication electronic warfare systems
Por: Poisel, Richard
Publicado em: (2002)
Por: Poisel, Richard
Publicado em: (2002)
Introduction to cyber-warfare a multidisciplinary approach /
Por: Shakarian, Paulo
Publicado em: (2013)
Por: Shakarian, Paulo
Publicado em: (2013)
Striking first preemptive and preventive attack in U.S. national security policy /
Publicado em: (2006)
Publicado em: (2006)
Lifting the fog of peace how Americans learned to fight modern war /
Por: Davidson, Janine
Publicado em: (2010)
Por: Davidson, Janine
Publicado em: (2010)
Commercial multimedia technologies for twenty-first century army battlefields a technology management strategy /
Publicado em: (1995)
Publicado em: (1995)
America's strategic choices
Publicado em: (2000)
Publicado em: (2000)
Security in a changing world case studies in U.S. national security management /
Publicado em: (2002)
Publicado em: (2002)
U.S. defense policy.
Publicado em: (1983)
Publicado em: (1983)
Real security : restoring American power in a dangerous decade /
Por: Barnet, Richard J.
Publicado em: (1981)
Por: Barnet, Richard J.
Publicado em: (1981)
Strategic advantage challengers, competitors, and threats to America's future /
Por: Berkowitz, Bruce D., 1956-
Publicado em: (2008)
Por: Berkowitz, Bruce D., 1956-
Publicado em: (2008)
Under the eagle's wing a national security strategy of the United States for 2009 /
Por: Hart, Gary
Publicado em: (2008)
Por: Hart, Gary
Publicado em: (2008)
The long war a new history of U.S. national security policy since World War II /
Publicado em: (2007)
Publicado em: (2007)
Unending crisis national security policy after 9/11 /
Por: Graham, Thomas, 1933-
Publicado em: (2012)
Por: Graham, Thomas, 1933-
Publicado em: (2012)
New directions in U.S. national security strategy, defense plans, and diplomacy : a review of official strategic documents /
Por: Kugler, Richard L.
Publicado em: (2011)
Por: Kugler, Richard L.
Publicado em: (2011)
The modern American military
Publicado em: (2013)
Publicado em: (2013)
American national security
Publicado em: (2009)
Publicado em: (2009)
Irrational security the politics of defense from Reagan to Obama /
Por: Wirls, Daniel, 1960-
Publicado em: (2010)
Por: Wirls, Daniel, 1960-
Publicado em: (2010)
No use : nuclear weapons and U.S. national security /
Por: Nichols, Thomas M., 1960-
Publicado em: (2014)
Por: Nichols, Thomas M., 1960-
Publicado em: (2014)
Orchestrating the instruments of power : a critical examination of the U.S. national security system /
Por: Worley, D. Robert (Duane Robert), 1949-
Publicado em: (2015)
Por: Worley, D. Robert (Duane Robert), 1949-
Publicado em: (2015)
Learning large lessons the evolving roles of ground power and air power in the post-Cold War era /
Por: Johnson, David E. (David Eugene), 1950-
Publicado em: (2006)
Por: Johnson, David E. (David Eugene), 1950-
Publicado em: (2006)
Science and technology for army homeland security.
Publicado em: (2003)
Publicado em: (2003)
Army science and technology for homeland security.
Publicado em: (2004)
Publicado em: (2004)
Crisis and escalation in cyberspace /
Por: Libicki, Martin C.
Publicado em: (2012)
Por: Libicki, Martin C.
Publicado em: (2012)
Registos relacionados
-
China's cyberwarfare capability
Publicado em: (2010) -
A cyberworm that knows no boundaries
Por: Porche, Isaac, 1968-
Publicado em: (2011) -
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publicado em: (2009) -
Cyberdeterrence and cyberwar
Por: Libicki, Martin C.
Publicado em: (2009) -
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
Por: Cordesman, Anthony H.
Publicado em: (2002)