Title: Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy, Author: Joint Advanced Warfighting School
Title: Utilizing Android and the Cloud Computing Environment to Increase Situational Awareness for a Mobile Distributed Response, Author: Naval Postgraduate School
Title: Examining Cyber Command Structures - History of Air and Space Domains, Nuclear Weapons Mission, Alternative Force Structures for Cyber Command and Control (C2), USCYBERCOM, Author: Progressive Management
Title: Essential Guide to Homeland Security Cyber Storm National Cyber Exercises: Full Reports from Five Cyber Attack Simulations Through 2016, Preparedness, Response, Coordination and Recovery Mechanisms, Author: Progressive Management
Title: Part 2. On the Creation of the Satoshi Nakamoto and Bitcoin Group., Author: Ayrat Minikhuzin
Title: The Unwanted Gaze: The Destruction of Privacy in America, Author: Jeffrey  Rosen
Title: Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM), Author: Progressive Management
Title: 10 Things That Used to be Good Ideas in Data Security, Author: Mike Winkler
Title: 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution, Author: Progressive Management
Title: Bitcoin & Blockchain: 2 Manuscripts - Understanding Bitcoin & Understanding Bitcoin, Author: Sean Bennett
Title: Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces, Author: Progressive Management
Title: The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden, Author: Progressive Management
Title: Applying Lessons Learned from Interwar Airpower (1919-1939) to Joint Warfighting With Cyberpower - Change Agents Moffett, Patrick, Reeves; Army and Navy Doctrine, Personnel, and Technology, Author: Progressive Management
Title: Identity Theft in the Cyber Age, Author: Ronald J. Leach
Title: Web Application Firewall Assurance, Author: Roman Potapov
Title: Your Short Guide to Security Systems, Author: Everything Security Systems
Title:
Title: Cyberspace Operations: What Senior Leaders Need to Know About Cyberspace - EMP, Catastrophic Events, Carrington Event, plus Resilient Military Systems and the Advanced Cyber Threat, Author: Progressive Management
Title: National Guard Forces in the Cyber Domain: Integrating the Guard into National Cyber Forces and Defenses, Cybersecurity Protecting Critical Infrastructure from Hactivists and Terrorist Groups, Author: Progressive Management
Title: Organizing, Training, and Retaining Intelligence Professionals for Cyber Operations: NSA and Air Force Cyberspace Landscape, ISR, Equipping ISR Pros to Win in Cyberspace, Preserving the Advantage, Author: Progressive Management

Pagination Links