-
1
-
-
79960310997
-
Ethics and information warfare
-
Z. Khalilzad, J. White, & A. Marsall (Eds.),Rand Corporation, Santa Monica, CA, USA
-
Arquilla, J. (1999). Ethics and information warfare. In Z. Khalilzad, J. White, & A. Marsall (Eds.), Strategic appraisal: the changing role of information in warfare (pp. 379-401). Rand Corporation, Santa Monica, CA, USA.
-
(1999)
Strategic Appraisal: The Changing Role of Information in Warfare
, pp. 379-401
-
-
Arquilla, J.1
-
2
-
-
66249147541
-
A survey of botnet technology and defenses
-
March
-
Bailey, M., Cooke, E., Jahanian, F., Xu, Y., & Karir, M. (2009, March). A survey of botnet technology and defenses. Proc. Conf. for Homeland Security: Cybersecurity Applications and Technology.
-
(2009)
Proc. Conf. for Homeland Security: Cybersecurity Applications and Technology
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
3
-
-
84898313133
-
Network attack
-
US Army War College Quarterly
-
Bayles, W. (2001). Network attack. Parameters . US Army War College Quarterly, 31, 44-58.
-
(2001)
Parameters
, vol.31
, pp. 44-58
-
-
Bayles, W.1
-
4
-
-
0037991411
-
The globalization of jurisdiction
-
Berman, P. (2002). The globalization of jurisdiction. University of Pennsylvania Law Review, 151(2), 311-545. doi:10.2307/3312952 (Pubitemid 36567560)
-
(2002)
University of Pennsylvania Law Review
, vol.151
, Issue.2
, pp. 311-545
-
-
Berman, P.S.1
-
6
-
-
84864127509
-
High technology war and 'surgical strikes [ACMSIGCAS]
-
Bissett, A. (2004). High technology war and 'surgical strikes'. [ACM SIGCAS]. Computers & Society, 32(7), 4.
-
(2004)
Computers & Society
, vol.32
, Issue.7
, pp. 4
-
-
Bissett, A.1
-
7
-
-
0343279272
-
-
Oxford, UK: Oxford University Press
-
Bok, S. (1986). Secrets. Oxford, UK: Oxford University Press.
-
(1986)
Secrets
-
-
Bok, S.1
-
8
-
-
30344477251
-
Economically complex cyberattacks
-
DOI 10.1109/MSP.2005.146
-
Borg, S. (2005, November-December). Economically complex cyberattacks. IEEE Security and Privacy, 3(6), 64-67. doi:10.1109/MSP.2005.146 (Pubitemid 43060397)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 64-67
-
-
Borg, S.1
-
11
-
-
84857872961
-
The ethics of cyber conflict
-
K. Himma, & H. Tavani (Eds.), New York: Wiley
-
Denning, D. (2007). The ethics of cyber conflict. In K. Himma, & H. Tavani (Eds.), Information and computer ethics. New York: Wiley.
-
(2007)
Information and Computer Ethics
-
-
Denning, D.1
-
12
-
-
84864137614
-
Restoration component of business continuity planning
-
H. Tipton, & M. Krause (Eds.), CRC Press
-
Dorf, J., & Johnson, M. (2007). Restoration component of business continuity planning. In H. Tipton, & M. Krause (Eds.), Information security management handbook (6th ed.) (pp. 645-1654). CRC Press.
-
(2007)
Information Security Management Handbook (6th ed.)
, pp. 645-1654
-
-
Dorf, J.1
Johnson, M.2
-
17
-
-
70849115871
-
The ethics of tracing hacker attacks through the machines of innocent persons
-
Himma, K. (2004). The ethics of tracing hacker attacks through the machines of innocent persons. International Journal of Information Ethics, 2(11), 1-13.
-
(2004)
International Journal of Information Ethics
, vol.2
, Issue.11
, pp. 1-13
-
-
Himma, K.1
-
18
-
-
84864146691
-
New tools, new rules: International law and information operations
-
G. David, & T. McKeldin (Eds.), Temple University Legal Studies Research PaperNo. 2007-15, Philadelphia, PA, USA
-
Hollis, D. (2007). New tools, new rules: international law and information operations. In G. David, & T. McKeldin (Eds.), The message of war: information, influence, and perception in armed conflict. Temple University Legal Studies Research Paper No. 2007- 15, Philadelphia, PA, USA.
-
(2007)
The Message of War: Information, Influence, and Perception in Armed Conflict
-
-
Hollis, D.1
-
19
-
-
84864126836
-
-
ICRC (International Committee of the Red Cross). Retrieved December 1, 2007 from
-
ICRC (International Committee of the Red Cross). (2007). International humanitarian law - treaties and documents. Retrieved December 1, 2007 from www.icrc.org/icl.nsf.
-
(2007)
International Humanitarian Law - Treaties and Documents
-
-
-
20
-
-
84864153207
-
Unexpected consequences from knock-on effects: A different standard for computer network operations?
-
Jensen, E. (2003). Unexpected consequences from knock-on effects: a different standard for computer network operations? American University International Law Review, 18, 1145-1188.
-
(2003)
American University International Law Review
, vol.18
, pp. 1145-1188
-
-
Jensen, E.1
-
22
-
-
33645142942
-
-
Boca Raton, FL: CRC Press
-
Jones, A., Kovacich, G., & Luzwick, P. (2002). Global information warfare. Boca Raton, FL: CRC Press.
-
(2002)
Global Information Warfare
-
-
Jones, A.1
Kovacich, G.2
Luzwick, P.3
-
23
-
-
84864146696
-
Ten information warfare trends
-
L. Janczewski & A. Colarik (Eds.), Hershey, PA, USA: IGI Global
-
Knapp, K., & Boulton, W. (2007). Ten information warfare trends. In L. Janczewski & A. Colarik (Eds.), Cyber Warfare and Cyber Terrorism (pp. 17-25). Hershey, PA, USA: IGI Global.
-
(2007)
Cyber Warfare and Cyber Terrorism
, pp. 17-25
-
-
Knapp, K.1
Boulton, W.2
-
24
-
-
34248536523
-
Root Kits - An operating systems viewpoint
-
DOI 10.1145/974104.974105
-
Kuhnhauser, W. (2004, January). Root kits: an operating systems viewpoint. ACM SIGOPS Operating Systems Review, 38(1), 12-23. doi:10.1145/974104.974105 (Pubitemid 46746975)
-
(2004)
Operating Systems Review (ACM)
, vol.38
, Issue.1
, pp. 12-23
-
-
Kuhnhauser, W.E.1
-
28
-
-
0003468598
-
-
(5th ed.). Boston, MA: Addison-Wesley Professional
-
Mel, H., & Baker, D. (2000). Cryptography decrypted (5th ed.). Boston, MA: Addison-Wesley Professional.
-
(2000)
Cryptography Decrypted
-
-
Mel, H.1
Baker, D.2
-
29
-
-
84875627527
-
The legitimization of strategic information warfare: Ethical considerations
-
Fall, Retrieved November 23, 2005 from
-
Molander, R., & Siang, S. (1998, Fall). The legitimization of strategic information warfare: ethical considerations. AAAS Professional Ethics Report, 11(4). Retrieved November 23, 2005 from www. aaas.org/spp/sfrl/sfrl.htm.
-
(1998)
AAAS Professional Ethics Report
, vol.11
, pp. 4
-
-
Molander, R.1
Siang, S.2
-
30
-
-
0006984935
-
-
Princeton, NJ: Princeton University Press
-
Nardin, T. (Ed.). (1998). The ethics of war and peace. Princeton, NJ: Princeton University Press.
-
(1998)
The Ethics of War and Peace
-
-
Nardin, T.1
-
33
-
-
84875600002
-
-
Retrieved February 6, 2009 from globalguerrillas
-
Robb, J. (2007). The U.S. and cyberwarfare. Retrieved February 6, 2009 from globalguerrillas. typepad.com/globalguerrillas/2007/12/the-us-andcyber. html.
-
(2007)
The U.S. and Cyberwarfare
-
-
Robb, J.1
-
34
-
-
70449654593
-
Wired warfare: Computer network attack and jus in bello
-
Schmitt, M. (2002). Wired warfare: computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365-399.
-
(2002)
International Review of the Red Cross
, vol.84
, Issue.846
, pp. 365-399
-
-
Schmitt, M.1
-
40
-
-
84875586831
-
-
White Wolf Security. Retrieved February 6
-
White Wolf Security. Offensive operations in cyberspace. Retrieved February 6, 2009 from www. whitewolfsecurity.com/publications/offensive-ops. php.
-
(2009)
Offensive operations in Cyberspace
-
-
|