Query Result Set
Skip Navigation Links
   ActiveUsers:1133Hits:19100125Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER WARRIORS (4) answer(s).
 
SrlItem
1
ID:   151348


Cyber space: reshaping the contours of international politics / Gupta, Ashish   Journal Article
Gupta, Ashish Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
2
ID:   130650


Cyber warfare and the laws of war / Jha, U C   Journal Article
Jha, U C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
3
ID:   163803


From cold to cyber warriors: the origins and expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers / Loleski, Steven   Journal Article
Loleski, Steven Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How did the National Security Agency (NSA) adopt the practice of hacking? This paper explores how NSA confronted the digital age by focusing on arguably NSA’s key organizational innovation as a microcosm of these broader changes: the Office of Tailored Access Operations (TAO). This paper develops a pragmatist model of organizational change showing how the practice of hacking became a practical solution to deal with the problems posed by a globally networked world through TAO’s case history. TAO’s aggressive expansion by developing a scalable Computer Network Exploitation (CNE) architecture was designed to keep NSA relevant in the twenty-first century
Key Words NSA  Cyber Warriors 
        Export Export
4
ID:   122056


Offensive cyber for the joint force commander: it's not that different / Carter, Rosemary M; Feick, Brent; Undersander, Roy C   Journal Article
Carter, Rosemary M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export