Cyberwarfare

Results: 11990



#Item
361Anton Myrer / Daniel Yergin / Martin van Creveld / John Keegan / Once An Eagle / Habeck / Reid / Cyberwarfare / Wolfsthal

ARMY CHIEF OF STAFF READING LIST 2014 Armies at War – Battles and Campaigns Title The AEF Way of War

Add to Reading List

Source URL: lgdata.s3-website-us-east-1.amazonaws.com

Language: English - Date: 2014-11-17 20:25:42
362Generally Accepted Accounting Principles / Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Financial statements / Statement of changes in equity / Earnings before interest /  taxes /  depreciation /  and amortization / Financial ratio / Balance sheet / Denial-of-service attack / Investment / DDoS mitigation

26 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-26 04:51:36
363Cybercrime / Cyberwarfare / Cyberinfrastructure / E-Science / Horizon / European Union Agency for Network and Information Security / Net neutrality / Computer security

ACM - Europe Public Policy Committee (EUACM) October newsletter LAW AND POLICY Cybersecurity

Add to Reading List

Source URL: europe.acm.org

Language: English - Date: 2015-12-14 16:16:59
364Cyberwarfare / Computer network security / Computer security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software / Kaspersky Lab

Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

Add to Reading List

Source URL: postmodernopenings.com

Language: English - Date: 2016-06-27 06:38:15
365Actuarial science / Cyberwarfare / Risk / Finance / Risk management / Treasurer / Treasury management / Corporate finance / Computer security / Insurance / Enterprise risk management

CTC Guide Cybersecurity: Setting a Cyberrisk Management Strategy Supported by

Add to Reading List

Source URL: www.mmc.com

Language: English - Date: 2016-03-22 23:59:21
366Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Horizon / Big data / Internet of things

ACM Europe Policy Committee January 2016 newsletter EUACM NEWS EUACM established a one year partnership with Science|Business and is now part of their member network. Science|Business links more than 30 partners in a hi

Add to Reading List

Source URL: europe.acm.org

Language: English - Date: 2016-02-01 13:51:03
367Cybercrime / National security / Cyberwarfare / Hacking / Military technology / Lomonosov / Computer security / Cyberspace / Internet and terrorism / Rafal Rohozinski

AGENDA Tenth International Forum «Partnership of State Authorities, Civil Society and the Business Community in Ensuring International Information Security» and Thirteenth Scientific Conference of the

Add to Reading List

Source URL: www.iisi.msu.ru

Language: English - Date: 2016-06-03 08:40:13
368Cybercrime / Cyberwarfare / Attention / Cognition / Situation awareness / CubeSat / Computer security

® is a publication of the American Institute of Aeronautics and Astronautics Ben Iannotta Editor-in-Chief

Add to Reading List

Source URL: www.aerospaceamerica.org

Language: English
369Cybercrime / National security / Computer security / Secure communication / Cyberwarfare / Sony Pictures Entertainment hack / Security hacker / Cyber-attack

Microsoft Word - Sample blog post from PowerLine.docx

Add to Reading List

Source URL: bestwritetech.com

Language: English - Date: 2016-05-03 15:10:28
370Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / United States Computer Emergency Readiness Team / SCADA / Cyber-attack / ISAC

TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2016-03-22 09:34:19
UPDATE