James Lewis

Results: 397



#Item
51

Confidence-building and international agreement in cybersecurity James Andrew Lewis The global digital network has become the backbone of the world economy and a significant new venue for attack, but there has been littl

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2012-09-11 11:10:26
    52

    Government Open Source Policies August 2007 Center for Strategic and International Studies Introductory Note James A. Lewis This is the fourth update to the CSIS Open Source Policy survey. The survey tracks governmental

    Add to Reading List

    Source URL: csistechpolicy.net

    Language: English
      53

      Why Can’t the U.S. Have Its Own MI5? James A. Lewis, CSIS August 2006 Britain’s success in stopping a plot to bomb a dozen airliners has prompted a renewal of the calls for an American version of the MI5 (the former

      Add to Reading List

      Source URL: csistechpolicy.net

      Language: English
        54

        Cross-Domain Deterrence and Credible Threats James A. Lewis Center for Strategic and International Studies July 2010 The concept of deterrence rests on a series of assumptions about how potential opponents recognize, int

        Add to Reading List

        Source URL: csis.org

        Language: English - Date: 2010-07-02 14:15:31
          55

          Cyber Incidents Attributed to China Laura Saporito and James A. Lewis Center for Strategic and International Studies Many times in discussion of cybersecurity one hears the charge that there is no evidence that China and

          Add to Reading List

          Source URL: csistechpolicy.net

          Language: English - Date: 2014-08-22 14:15:45
            56

            Commercial Aviation and MANPADS: Threat or Theory James A. Lewis January 2006 One of the consequences of the September 11 attacks is a more fearful America. This America is willing to spend to defend itself against impro

            Add to Reading List

            Source URL: csistechpolicy.net

            Language: English - Date: 2014-08-22 14:15:41
              57

              Government Open Source Policies March 2010 Center for Strategic and International Studies Introductory Note James A. Lewis This is the seventh update to the CSIS Open Source Policy survey. The survey tracks governmental

              Add to Reading List

              Source URL: csistechpolicy.net

              Language: English - Date: 2014-08-22 14:16:00
                58

                Government Open Source Policies – April 2006 James A. Lewis Center for Strategic and International Studies This is the third update to our Open Source Policies table. The attached table tracks explicit governmental pol

                Add to Reading List

                Source URL: csistechpolicy.net

                Language: English - Date: 2014-08-22 14:15:57
                  59Geography of the United Kingdom / British honours system / Geography of Wales / United Kingdom / High Sheriff of Carmarthenshire / Llanelli / Lewis / Carmarthen

                  Kidwelly Parish BurialsFirstname William James Mary

                  Add to Reading List

                  Source URL: web.archive.org

                  Language: English
                  60War / Electronic warfare / Hacking / Military technology / Military science / Cyberterrorism / Cyber / Industrial espionage / Internet-related prefixes / Cyberwarfare / Computer crimes / Security

                  The Cyber War Has Not Begun James Andrew Lewis Center for Strategic and International Studies March 2010 Expanded attention to cybersecurity is a good thing, but it seems that it is difficult to discuss this topic withou

                  Add to Reading List

                  Source URL: csis.org

                  Language: English - Date: 2010-03-11 13:45:21
                  UPDATE