-
1
-
-
84911086633
-
Warrior in the Age of Intelligent Machines
-
April
-
Peter Schwartz, "Warrior in the Age of Intelligent Machines" Wired Magazine, April 1995.
-
(1995)
Wired Magazine
-
-
Schwartz, P.1
-
2
-
-
84946440850
-
The Transformation of War and the Future of the Corps
-
U.S. Marine Corps Command & Staff College, AY 92-93
-
Robert D. Steele, "The Transformation of War and the Future of the Corps", in INTELLIGENCE Selected Readings - Book One (U.S. Marine Corps Command & Staff College, AY 92-93).
-
INTELLIGENCE Selected Readings - Book One
-
-
Steele, R.D.1
-
11
-
-
84946440853
-
-
Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance Workshops 2000, 2001, 2002, 2003.
-
Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance Workshops 2000, 2001, 2002, 2003
-
-
-
12
-
-
84907007824
-
-
Strategic Forum 28, Institute for National Strategic Studies, May
-
Martin Libicki, What is Information Warfare, Strategic Forum 28, Institute for National Strategic Studies, May 1995.
-
(1995)
What is Information Warfare
-
-
Libicki, M.1
-
14
-
-
0344095468
-
-
Beijing: PLA Literature and Arts Publishing House, February
-
Qiao Liang and Wang Xiangsui, Unrestricted Warfare, Beijing: PLA Literature and Arts Publishing House, February 1999; English online at www.terrorism.com/documents/unrestricted.pdf
-
(1999)
Unrestricted Warfare
-
-
Qiao, L.1
Wang, X.2
-
17
-
-
1242345863
-
Hackers Victimize Cal-ISO
-
June 9
-
Dan Morain. "Hackers Victimize Cal-ISO." The Los Angeles Times June 9, 2001
-
(2001)
The Los Angeles Times
-
-
Morain, D.1
-
18
-
-
52649169276
-
The Terrorists are Winning the Cyber War
-
September 19
-
Piller, Charles and David Wilson. "The Terrorists are Winning the Cyber War." The Los Angeles Times September 19, 2001
-
(2001)
The Los Angeles Times
-
-
Piller, C.1
Wilson, D.2
-
19
-
-
3242794785
-
Cyberwar: Combat on the Web
-
August 16, Dow Jones & Company, Inc.
-
Bickers, Charles. "Cyberwar: Combat on the Web" Far Eastern Economic Review August 16, 2001, Dow Jones & Company, Inc.
-
(2001)
Far Eastern Economic Review
-
-
Bickers, C.1
-
21
-
-
84946440857
-
CIA Warns of Chinese Plans for Cyber-Attacks Defense: Analysts fear government and private efforts to sabotage federal Internet sites
-
Apr 25
-
Eric Lichtbau. "CIA Warns of Chinese Plans for Cyber-Attacks Defense: Analysts fear government and private efforts to sabotage federal Internet sites." The Los Angeles Times Apr 25, 2002
-
(2002)
The Los Angeles Times
-
-
Lichtbau, E.1
-
23
-
-
84946440859
-
FBI Finds Source of Internet Attacks Last month's denial of service attacks against Internet's core servers have been traced to computers in U.S. and Korea
-
November 04
-
"FBI Finds Source of Internet Attacks Last month's denial of service attacks against Internet's core servers have been traced to computers in U.S. and Korea." IDG News Service Monday, November 04, 2002
-
(2002)
IDG News Service Monday
-
-
-
25
-
-
5844410694
-
-
edited and translated by R. L Wing, Doubleday, New York
-
Sun Tzu, The Art of Strategy, edited and translated by R. L Wing, Doubleday, New York, 1988
-
(1988)
The Art of Strategy
-
-
Tzu, S.1
-
26
-
-
0003956784
-
-
edited and translated by Michael Howard and Peter Paret, Alfred A. Knopf
-
Carl Von Clausewitz, On War, edited and translated by Michael Howard and Peter Paret, Alfred A. Knopf, 1993
-
(1993)
On War
-
-
Von Clausewitz, C.1
-
29
-
-
84898141063
-
Principles of Cyber-warfare
-
Raymond C. Parks and David P. Duggan. Principles of Cyber-warfare, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 June, 2001
-
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 June, 2001
-
-
Parks, R.C.1
Duggan, D.P.2
-
30
-
-
9944262642
-
-
University Press of the Pacific reprint National Defense University Press
-
Martin C. Libicki, Defending Cyberspace and Other Metaphors, University Press of the Pacific 2002 (reprint National Defense University Press 1997)
-
(1997)
Defending Cyberspace and Other Metaphors
-
-
Libicki, M.C.1
-
31
-
-
84946440862
-
Modeling Behavior of the Cyber-Terrorist
-
Gregg Schudel, Bradley Wood, Raymond Parks, "Modeling Behavior of the Cyber-Terrorist", National Security Forum on International Cooperation to Combat Cyber Crime and Terrorism, Hoover Institution, Stanford University, 6 December 1999.
-
National Security Forum on International Cooperation to Combat Cyber Crime and Terrorism, Hoover Institution, Stanford University, 6 December 1999
-
-
Schudel, G.1
Wood, B.2
Parks, R.3
-
38
-
-
84946440868
-
SYSTEM AND PROCESS FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACKS ON NETWORK NODES
-
WO World Intellectual Property Organization (WIPO) March 7
-
Krishna NARAYANASWAMY, Barry, A.SPINNEY, Theodore, L. ROSS, Michael, D. PAQUETTE, and Christopher, L. WRIGHT. WO0219661A3: SYSTEM AND PROCESS FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACKS ON NETWORK NODES, World Intellectual Property Organization (WIPO) March 7, 2002
-
(2002)
-
-
Narayanaswamy, K.1
Spinney, B.A.2
Ross, T.L.3
Paquette, M.D.4
Wright, C.L.5
-
39
-
-
84946440869
-
-
Dahlgren Lab Information Assurance Office
-
"InfoCon" Naval Surface Warfare Center - Dahlgren Lab Information Assurance Office http://www.nswc.navy.mil/ISSEC/Guidance/infocon/
-
InfoCon
-
-
-
40
-
-
84946440870
-
-
OpenBSD - http://www.openbsd.org/
-
-
-
-
43
-
-
0002067431
-
NetSTAT: A Network-based Intrusion Detection System
-
Giovanni Vigna NetSTAT: A Network-based Intrusion Detection System, Journal of Computer Security (1999)
-
(1999)
Journal of Computer Security
-
-
Vigna, G.1
|