Redefining information warfare boundaries for an Army in a wireless world
Gardado en:
Autor Principal: | Porche, Isaac, 1968- |
---|---|
Corporate Authors: | Arroyo Center, ebrary, Inc |
Outros autores: | Paul, Christopher, 1971- |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Santa Monica, Calif. :
RAND,
[2013]
|
Series: | Rand Corporation monograph series.
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
China's cyberwarfare capability
Publicado: (2010)
Publicado: (2010)
A cyberworm that knows no boundaries
por: Porche, Isaac, 1968-
Publicado: (2011)
por: Porche, Isaac, 1968-
Publicado: (2011)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publicado: (2009)
Publicado: (2009)
Cyberdeterrence and cyberwar
por: Libicki, Martin C.
Publicado: (2009)
por: Libicki, Martin C.
Publicado: (2009)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)
por: Cordesman, Anthony H.
Publicado: (2002)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
por: Paul, Christopher, 1971-, et al.
Publicado: (2014)
por: Paul, Christopher, 1971-, et al.
Publicado: (2014)
The new era in U.S. national security : an introduction to emerging threats and challenges /
por: Jarmon, Jack A., 1951-
Publicado: (2014)
por: Jarmon, Jack A., 1951-
Publicado: (2014)
Cyber security /
Publicado: (2014)
Publicado: (2014)
Cyber security and resiliency policy framework /
Publicado: (2014)
Publicado: (2014)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado: (2013)
por: Winterfeld, Steve
Publicado: (2013)
Wars of disruption and resilience cybered conflict, power, and national security /
por: Demchak, Chris C.
Publicado: (2011)
por: Demchak, Chris C.
Publicado: (2011)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado: (2012)
por: Ventre, Daniel
Publicado: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
Force multiplying technologies for logistics support to military operations /
Publicado: (2014)
Publicado: (2014)
Cybersecurity today and tomorrow pay now or pay later /
Publicado: (2002)
Publicado: (2002)
Quadrennial defense review assessing U.S. defense and security /
Publicado: (2011)
Publicado: (2011)
Terrorism, asymmetric warfare, and weapons of mass destruction defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)
por: Cordesman, Anthony H.
Publicado: (2002)
Introduction to communication electronic warfare systems
por: Poisel, Richard
Publicado: (2002)
por: Poisel, Richard
Publicado: (2002)
Introduction to cyber-warfare a multidisciplinary approach /
por: Shakarian, Paulo
Publicado: (2013)
por: Shakarian, Paulo
Publicado: (2013)
Lifting the fog of peace how Americans learned to fight modern war /
por: Davidson, Janine
Publicado: (2010)
por: Davidson, Janine
Publicado: (2010)
Striking first preemptive and preventive attack in U.S. national security policy /
Publicado: (2006)
Publicado: (2006)
Commercial multimedia technologies for twenty-first century army battlefields a technology management strategy /
Publicado: (1995)
Publicado: (1995)
America's strategic choices
Publicado: (2000)
Publicado: (2000)
U.S. defense policy.
Publicado: (1983)
Publicado: (1983)
Real security : restoring American power in a dangerous decade /
por: Barnet, Richard J.
Publicado: (1981)
por: Barnet, Richard J.
Publicado: (1981)
Security in a changing world case studies in U.S. national security management /
Publicado: (2002)
Publicado: (2002)
The long war a new history of U.S. national security policy since World War II /
Publicado: (2007)
Publicado: (2007)
Strategic advantage challengers, competitors, and threats to America's future /
por: Berkowitz, Bruce D., 1956-
Publicado: (2008)
por: Berkowitz, Bruce D., 1956-
Publicado: (2008)
Under the eagle's wing a national security strategy of the United States for 2009 /
por: Hart, Gary
Publicado: (2008)
por: Hart, Gary
Publicado: (2008)
American national security
Publicado: (2009)
Publicado: (2009)
Unending crisis national security policy after 9/11 /
por: Graham, Thomas, 1933-
Publicado: (2012)
por: Graham, Thomas, 1933-
Publicado: (2012)
The modern American military
Publicado: (2013)
Publicado: (2013)
New directions in U.S. national security strategy, defense plans, and diplomacy : a review of official strategic documents /
por: Kugler, Richard L.
Publicado: (2011)
por: Kugler, Richard L.
Publicado: (2011)
Irrational security the politics of defense from Reagan to Obama /
por: Wirls, Daniel, 1960-
Publicado: (2010)
por: Wirls, Daniel, 1960-
Publicado: (2010)
No use : nuclear weapons and U.S. national security /
por: Nichols, Thomas M., 1960-
Publicado: (2014)
por: Nichols, Thomas M., 1960-
Publicado: (2014)
Science and technology for army homeland security.
Publicado: (2003)
Publicado: (2003)
Army science and technology for homeland security.
Publicado: (2004)
Publicado: (2004)
Orchestrating the instruments of power : a critical examination of the U.S. national security system /
por: Worley, D. Robert (Duane Robert), 1949-
Publicado: (2015)
por: Worley, D. Robert (Duane Robert), 1949-
Publicado: (2015)
Learning large lessons the evolving roles of ground power and air power in the post-Cold War era /
por: Johnson, David E. (David Eugene), 1950-
Publicado: (2006)
por: Johnson, David E. (David Eugene), 1950-
Publicado: (2006)
Preparing the U.S. Army for homeland security concepts, issues, and options /
por: Larson, Eric V. (Eric Victor), 1957-
Publicado: (2001)
por: Larson, Eric V. (Eric Victor), 1957-
Publicado: (2001)
Títulos similares
-
China's cyberwarfare capability
Publicado: (2010) -
A cyberworm that knows no boundaries
por: Porche, Isaac, 1968-
Publicado: (2011) -
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publicado: (2009) -
Cyberdeterrence and cyberwar
por: Libicki, Martin C.
Publicado: (2009) -
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)