-
1
-
-
84905939860
-
Inventing the Railroad and Rifle Revolution: Information, Military Innovation and the Rise of Germany
-
paper prepared for The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March
-
Geoffrey L. Herrera, 'Inventing the Railroad and Rifle Revolution: Information, Military Innovation and the Rise of Germany', paper prepared for The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March, 2002).
-
(2002)
-
-
Herrera, G.L.1
-
2
-
-
84905947824
-
Beyond Fire and Movement: Command, Control, and Information in the German Blitzkrieg
-
paper prepared for The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March
-
Robert Citino, 'Beyond Fire and Movement: Command, Control, and Information in the German Blitzkrieg', paper prepared for The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March, 2002).
-
(2002)
-
-
Citino, R.1
-
3
-
-
84905949205
-
Information and the Air Defense Revolution, 1917-1940
-
paper preparedfor The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March
-
David Zimmerman, 'Information and the Air Defense Revolution, 1917-1940', paper preparedfor The Center for Strategic and Budgetary Assessments workshop on 'Military Revolutions: The Role of Information Capabilities' (Washington DC, 4-5 March, 2002).
-
(2002)
-
-
Zimmerman, D.1
-
4
-
-
84905947882
-
Integrated Security: A Strategic Response to Anonymity and the Problem of the Few
-
this volume
-
Richard J. Harknett, 'Integrated Security: A Strategic Response to Anonymity and the Problem of the Few', in this volume.
-
-
-
Harknett, R.J.1
-
6
-
-
84937189144
-
Information Operations, Deterrence, and the Use of Force
-
Roger W. Barnett, 'Information Operations, Deterrence, and the Use of Force', Naval War College Review, Vol. 51, No.2, pp.7-19;
-
Naval War College Review
, vol.51
, Issue.2
, pp. 7-19
-
-
Barnett, R.W.1
-
7
-
-
84859931798
-
Deterring Information Warfare: A New Strategic Challenge
-
Winter
-
T.L. Thomas, 'Deterring Information Warfare: A New Strategic Challenge', Parameters (Winter 1996-97), pp.81-91.
-
(1996)
Parameters
, pp. 81-91
-
-
Thomas, T.L.1
-
11
-
-
84905934324
-
War of Disruption: International Competition and Information Technology-Driven Military Organizations
-
this volume for a discussion of why lethality will remain a defining characteristic of how states, particularly the United States, wages warfarein the information age
-
Chris C. Demchak, 'War of Disruption: International Competition and Information Technology-Driven Military Organizations', in this volume for a discussion of why lethality will remain a defining characteristic of how states, particularly the United States, wages warfarein the information age.
-
-
-
Demchak, C.C.1
-
12
-
-
77950096546
-
Taking Aim at an Enemy's Chips
-
20 Feb
-
Seth Schiesel, 'Taking Aim at an Enemy's Chips', New York Times, 20 Feb. 2003, pp.E1, E5.
-
(2003)
New York Times
-
-
Schiesel, S.1
-
14
-
-
84908912505
-
America's Information Edge
-
March/April
-
JosephS. Nye, Jr. and William A. Owens, 'America's Information Edge', Foreign Affairs, Vol. 75, No.2 (March/April 1996), pp.20-36.
-
(1996)
Foreign Affairs
, vol.75
, Issue.2
, pp. 20-36
-
-
Nye Jr, J.S.1
Owens, W.A.2
-
15
-
-
9944226930
-
Watersheds in Perception and Knowledge: Twenty Years of Military Technology
-
draft manuscript, June
-
Chris C. Demchak, 'Watersheds in Perception and Knowledge: Twenty Years of Military Technology', draft manuscript (June 1999).
-
(1999)
-
-
Demchak, C.C.1
-
16
-
-
0041927162
-
War in the Information Age
-
Winter
-
Thomas G. Mahnken, 'War in the Information Age',Joint Force Quarterly (Winter 1995-96), pp.39-43.
-
(1995)
Joint Force Quarterly
, pp. 39-43
-
-
Mahnken, T.G.1
-
18
-
-
2142776120
-
-
third edn), (London: Frank Cass, 2
-
Michael I. Handel, Masters of War (third edn), (London: Frank Cass, 2001), p.150.
-
Masters of War
, pp. 150
-
-
Handel, M.I.1
-
19
-
-
4544309586
-
The Art of Port Scanning
-
Fyodor, 'The Art of Port Scanning',
-
-
-
Fyodor1
-
21
-
-
0011682875
-
-
Devon, England: David and Charles Publishers
-
Michael Dewar, The Art of Deception in Warfare (Devon, England: David and Charles Publishers, 1989), p.19.
-
(1989)
The Art of Deception in Warfare
, pp. 19
-
-
Dewar, M.1
-
27
-
-
0024011325
-
Stalking the Wily Hacker
-
May
-
C. Stoll, 'Stalking the Wily Hacker', Communications of the ACM, Vol. 31, No.5 (May 1988) pp.484-97.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
28
-
-
0347842666
-
Firing Leaflets and Electrons, U.S. Wages Information War
-
24 Feb. 24
-
Thorn Shanker and Eric Schmitt, 'Firing Leaflets and Electrons, U.S. Wages Information War', New York Times (24 Feb. 24 2003), pp.A1, A7.
-
(2003)
New York Times
-
-
Shanker, T.1
Schmitt, E.2
-
30
-
-
0004200684
-
Computer Security Technology Planning Study
-
Technical Report ESD-TR-73-51, Electronic Systems Division, Hanscom Air Force Base, Hanscom, MA
-
J. Anderson, 'Computer Security Technology Planning Study', Technical Report ESD-TR-73-51, Electronic Systems Division, Hanscom Air Force Base, Hanscom, MA (1974).
-
(1974)
-
-
Anderson, J.1
-
31
-
-
0009016272
-
An Evening with Befrerd, in Which a Cracker is Lured, Endured, and Studied
-
Jan
-
W. Cheswick, 'An Evening with Befrerd, in Which a Cracker is Lured, Endured, and Studied', Proceedings of the 1992 Winter USENIX Conference (Jan. 1992) pp.163-73.
-
(1992)
Proceedings of the 1992 Winter USENIX Conference
, pp. 163-173
-
-
Cheswick, W.1
-
33
-
-
84905959684
-
Information on Back Orifice and Net Bus
-
Symantec
-
Symantec, 'Information on Back Orifice and Net Bus', .
-
-
-
-
34
-
-
84905926350
-
The Four Functions of Force
-
Art, reprinted in Robert J. Art and Robert Jervis, fourth edn, New York: Harper Collins
-
Robert J. Art, 'The Four Functions of Force', reprinted in Robert J. Art and Robert Jervis, International Politics (fourth edn) (New York: Harper Collins, 1996), pp.159-60.
-
(1996)
International Politics
, pp. 159-160
-
-
Robert, J.1
-
35
-
-
84905952807
-
Cyber-deterrent
-
James Der Derian, 'Cyber-deterrent', Wired, Vol. 2, No.9, pp.116-22.
-
Wired
, vol.2
, Issue.9
, pp. 116-122
-
-
Derian, J.D.1
-
36
-
-
84909718092
-
Reflections on some Widespread Computer Break-Ins
-
Feb
-
B. Reid, 'Reflections on some Widespread Computer Break-Ins', Communications of the ACM, Vol. 30, No.2 (Feb. 1987), pp.103-5.
-
(1987)
Communications of the ACM
, vol.30
, Issue.2
, pp. 103-105
-
-
Reid, B.1
-
37
-
-
84905931153
-
The Diplomacy of Violence
-
reprinted in Art and Jervis
-
Thomas C. Schelling, 'The Diplomacy of Violence', reprinted in Art and Jervis, International Politics, pp.169.
-
International Politics
, pp. 169
-
-
Schelling, T.C.1
-
38
-
-
0003511360
-
Coercive Diplomacy: Definition and Characteristics
-
Alexander L. George and William E. Simons, ed, Boulder: Westview Press
-
Alexander L. George, 'Coercive Diplomacy: Definition and Characteristics', in Alexander L. George and William E. Simons, ed., The Limits of Coercive Diplomaq (Boulder: Westview Press, 1994), p.10.
-
(1994)
The Limits of Coercive Diplomaq
, pp. 10
-
-
George, A.L.1
|