Introduction to cyber-warfare a multidisciplinary approach /
Guardado en:
Autor principal: | Shakarian, Paulo |
---|---|
Autor Corporativo: | ebrary, Inc |
Otros Autores: | Shakarian, Jana, Ruef, Andrew |
Formato: | Electrónico eBook |
Lenguaje: | inglés |
Publicado: |
Amsterdam [Netherlands] :
Morgan Kaufmann Publishers, an imprint of Elsevier,
2013.
|
Materias: | |
Acceso en línea: | An electronic book accessible through the World Wide Web; click to view |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
Wars of disruption and resilience cybered conflict, power, and national security /
por: Demchak, Chris C.
Publicado: (2011)
por: Demchak, Chris C.
Publicado: (2011)
The virtual battlefield perspectives on cyber warfare /
Publicado: (2009)
Publicado: (2009)
Information warfare /
por: Ventre, Daniel
Publicado: (2016)
por: Ventre, Daniel
Publicado: (2016)
Cyberdeterrence and cyberwar
por: Libicki, Martin C.
Publicado: (2009)
por: Libicki, Martin C.
Publicado: (2009)
Cyber warfare : techniques, tactics and tools for security practitioners /
por: Andress, Jason
Publicado: (2014)
por: Andress, Jason
Publicado: (2014)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publicado: (2009)
Publicado: (2009)
Cyber blockades /
por: Russell, Alison Lawlor
Publicado: (2014)
por: Russell, Alison Lawlor
Publicado: (2014)
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
por: Paul, Christopher, 1971-, et al.
Publicado: (2014)
por: Paul, Christopher, 1971-, et al.
Publicado: (2014)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado: (2013)
por: Heickerö, Roland
Publicado: (2013)
Crisis and escalation in cyberspace /
por: Libicki, Martin C.
Publicado: (2012)
por: Libicki, Martin C.
Publicado: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado: (2013)
por: Winterfeld, Steve
Publicado: (2013)
Information Warfare : Forging Communication Strategies for Twenty-first Century Operational Environments /
por: Farwell, James P.
Publicado: (2020)
por: Farwell, James P.
Publicado: (2020)
Cyber crime and cyber terrorism investigator's handbook /
Publicado: (2014)
Publicado: (2014)
Cybercrime and cyberwarfare /
por: Bernik, Igor
Publicado: (2014)
por: Bernik, Igor
Publicado: (2014)
How to measure anything in cybersecurity risk /
por: Hubbard, Douglas W., 1962-, et al.
Publicado: (2016)
por: Hubbard, Douglas W., 1962-, et al.
Publicado: (2016)
Coercion, survival, and war : why weak states resist the United States /
por: Haun, Phil M.
Publicado: (2015)
por: Haun, Phil M.
Publicado: (2015)
Cyber security /
Publicado: (2014)
Publicado: (2014)
The evolution of cyber war : international norms for emerging-technology weapons /
por: Mazanec, Brian M.
Publicado: (2015)
por: Mazanec, Brian M.
Publicado: (2015)
Information warfare and organizational decision-making
Publicado: (2007)
Publicado: (2007)
Information operations planning
por: Allen, Patrick D.
Publicado: (2007)
por: Allen, Patrick D.
Publicado: (2007)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado: (2012)
por: Ventre, Daniel
Publicado: (2012)
Cyber security and resiliency policy framework /
Publicado: (2014)
Publicado: (2014)
Cyber security and IT infrastructure protection /
Publicado: (2014)
Publicado: (2014)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
China's cyberwarfare capability
Publicado: (2010)
Publicado: (2010)
Cyber risks for business professionals a management guide /
por: Kendrick, Rupert
Publicado: (2010)
por: Kendrick, Rupert
Publicado: (2010)
Networks and netwars the future of terror, crime, and militancy /
Publicado: (2001)
Publicado: (2001)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Publicado: (2015)
Publicado: (2015)
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Publicado: (2014)
Publicado: (2014)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)
por: Cordesman, Anthony H.
Publicado: (2002)
Emerging trends in ICT security /
Publicado: (2014)
Publicado: (2014)
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Publicado: (2015)
Publicado: (2015)
Information warfare
por: Ventre, Daniel
Publicado: (2009)
por: Ventre, Daniel
Publicado: (2009)
Redefining information warfare boundaries for an Army in a wireless world
por: Porche, Isaac, 1968-
Publicado: (2013)
por: Porche, Isaac, 1968-
Publicado: (2013)
Introduction to communication electronic warfare systems
por: Poisel, Richard
Publicado: (2002)
por: Poisel, Richard
Publicado: (2002)
Toward a safer and more secure cyberspace
Publicado: (2007)
Publicado: (2007)
The defendeŕs dilemma : charting a course toward cybersecurity /
por: Libicki, Martin C., et al.
Publicado: (2015)
por: Libicki, Martin C., et al.
Publicado: (2015)
H4ckers5 wanted : an examination of the cybersecurity labor market /
por: Libicki, Martin C., et al.
Publicado: (2014)
por: Libicki, Martin C., et al.
Publicado: (2014)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
por: Mehan, Julie E.
Publicado: (2008)
por: Mehan, Julie E.
Publicado: (2008)
Cyber threat! : how to manage the growing risk of cyber attacks /
por: Ulsch, N. MacDonnell, 1951-
Publicado: (2014)
por: Ulsch, N. MacDonnell, 1951-
Publicado: (2014)
Ejemplares similares
-
Wars of disruption and resilience cybered conflict, power, and national security /
por: Demchak, Chris C.
Publicado: (2011) -
The virtual battlefield perspectives on cyber warfare /
Publicado: (2009) -
Information warfare /
por: Ventre, Daniel
Publicado: (2016) -
Cyberdeterrence and cyberwar
por: Libicki, Martin C.
Publicado: (2009) -
Cyber warfare : techniques, tactics and tools for security practitioners /
por: Andress, Jason
Publicado: (2014)