Information warfare

Results: 1027



#Item
81Cyberwarfare / Electronic warfare / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Computer security / National Cyber Security Division / Security / Computer crimes / Public safety

In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee had approved separa

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-04-28 10:54:36
82Military strategy / Cyberwarfare / Foreign Military Studies Office / Unrestricted Warfare / Revolution in Military Affairs / Military / Chinese Information Operations and Information Warfare / Military science / Information operations / Information warfare

Cover The virtually projected dragons, figuratively depicting the dynamic tensions and electrifying complexities of confrontation between strategy and technology, churn up a stormy ocean of theoretical concepts that str

Add to Reading List

Source URL: fmso.leavenworth.army.mil

Language: English - Date: 2015-03-19 11:55:28
83Hacking / Computer network security / Crime prevention / National security / Electronic warfare / Vulnerability / Zero-day attack / Information security / Crimeware / Security / Cyberwarfare / Computer security

14503_155323526_cover.eps

Add to Reading List

Source URL: publications.tno.nl

Language: English
84Earth / Slavic / Information operations / Gerasimov / Information warfare / Armed Forces of the Russian Federation / Russia / War / Ukraine / Europe / Member states of the United Nations / Slavic countries

Yuri Kochetkov/AP/SIPA Russia’s info-war: theory and practice

Add to Reading List

Source URL: www.iss.europa.eu

Language: English - Date: 2015-04-10 07:01:32
85Government / Cyberwarfare / Electronic warfare / Hacking / Military technology / Federal Information Security Management Act / Computer security / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Security / Computer crimes / Public safety

Court Reporting Services, Inc. RPTJHolt HGO112000 ENHANCING CYBERSECURITY OF THIRD-PARTY CONTRACTORS AND VENDORS Wednesday, April 22, 2015,

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-05-04 12:43:34
86Automatic identification and data capture / Automatic number plate recognition / Electronic toll collection / Optical character recognition / Safety / Space and Naval Warfare Systems Command / AMBER Alert / Geo-fence / Artificial intelligence / Surveillance / Security

Information Led Policing SPAWAR Atlantic – Advanced Law Enforcement Technology Branch Law Enforcement License Plate Readers: Lessons Learned in Policy and Practice

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-05-08 11:27:01
87Military technology / Cyberwarfare / War / Computer security / Personally identifiable information / Military science / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Electronic warfare / Hacking

Myth v. Fact: The Protecting Cyber Networks Act (H.RMYTH: This legislation creates a government surveillance program. FACT:  The bill has nothing to do with government surveillance; rather, it provides narrow

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2015-04-21 12:53:01
88Biological weapons / Burkholderiales / Glanders / Horse health / Animal diseases / Zoonosis / Biological warfare / Burkholderia mallei / Burkholderia / Veterinary medicine / Health / Medicine

General Disease Information Sheets Glanders What is glanders? Glanders is an infectious and life-threatening disease that mainly affects horses, donkeys or mules caused by the bacterium Burkholderia mallei. Glanders can

Add to Reading List

Source URL: www.oie.int

Language: English - Date: 2013-01-22 11:54:44
89Computer crimes / Security / Cyberwarfare / Electronic warfare / Military technology / United States Cyber Command / Cyber spying / World Summit on the Information Society / Cyberwarfare in the United States / Cybercrime / Hacking / National security

CYFY 2014 16th & 17th October VOLUME II ISSUE 5

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2014-05-02 07:39:52
90Ethics / Electronic warfare / Military technology / Internet / Law / Internet privacy / Cyberterrorism / Privacy / The Information Technology Act / Computer crimes / Cyberwarfare / Computer law

CYFY 2015 14th to 16th October VOLUME III ISSUE 3

Add to Reading List

Source URL: www.orfonline.org

Language: English - Date: 2015-03-10 08:44:23
UPDATE