scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "Cyberspace operations (Military science)--Government policy"

1 - 10 of 27 results for
 "Cyberspace operations (Military science)--Government policy"
Results per page:
Routledge Handbook of International Cybersecurity

Routledge Handbook of International Cybersecurity

Publication Type:eBook

Abstract:The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and securi...

View details

CYBERATTACK: WHAT GOES AROUND, COMES AROUND: RISKS OF A CYBERATTACK STRATEGY.

Publication Type:Academic Journal

Source(s):School of Public Policy Publications; Jun2019, Vol. 12 Issue 17, preceding p1-22, 23p

Abstract:Copyright of School of Public Policy Publications is the property of University of Calgary, School of Public Policy and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written pe...

View details

The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective.

Publication Type:Academic Journal

Source(s):Journal of Chinese Political Science; Jun2019, Vol. 24 Issue 2, p225-247, 23p

Abstract:Copyright of Journal of Chinese Political Science is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may pr...

View details

A Reality Check on a Cyber Force.

Publication Type:Academic Journal

Source(s):Strategic Studies Quarterly; Summer2016, Vol. 10 Issue 2, p116-133, 18p

Abstract:Copyright of Strategic Studies Quarterly is the property of Strategic Studies Quarterly and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may...

View details

ARMED WITH A KEYBOARD: PRESIDENTIAL DIRECTIVE 20, CYBER-WARFARE, AND THE INTERNATIONAL LAWS OF WAR.

Publication Type:Academic Journal

Source(s):Capital University Law Review; Summer2015, Vol. 43 Issue 3, p679-720, 42p

Abstract:The article discusses American government cyberspace security measures in relation to U.S. President Barack Obama's issuance of Presidential Policy Directive 20 on cyber-warfare in October 2012 and the international laws of war. America's National Secu...

View details

Growing Capable Cyber Officers for the Digital Domain Fight.

Publication Type:Periodical

Source(s):Army Magazine; Jul2017, Vol. 67 Issue 7, p31-33, 3p

Abstract:The article presents the author's views on cyber officers and their work. Particular focus is given to the security of the data, the opening of the U.S. Army Cyber School, and the training of the officers in the Army. Other topics addressed include det...

View details

Israeli Defense in the Age of Cyber War.

Publication Type:Academic Journal

Source(s):Middle East Quarterly. Winter2017, Vol. 24 Issue 1, p1-10. 10p. 4 Color Photographs, 1 Graph.

Abstract:The article discusses Israel's military defense for potential cyber war and cyber threats, including the Israeli and U.S.'s Stuxnet computer worm it inflicted on Iranian computer systems controlling centrifuges. Israel's national and computer security ...

View details

banner_970x250 (970x250)

sponsored