Query Result Set
Skip Navigation Links
   ActiveUsers:1050Hits:18592000Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBERSPACE OPERATIONS (6) answer(s).
 
SrlItem
1
ID:   166289


Bytes, bombs and spies: the strategic dimensions of offensive cyber operations / Lin, Herbert (ed.); Zegart, Amy (ed.) 2018  Book
Lin, Herbert (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Washington, D C, Brookings Institution Press, 2018.
Description xiii, 424p.pbk
Standard Number 9780815735472
   Reserve     Export Export
Copies: C:1/I:1,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocationIssuedToDueOn
059656355.0305/LIN 059656MainIssuedGeneral RF07617-Jun-2023
2
ID:   143834


Cyber warfare: a multidisciplinary analysis / Green, James A (ed.) 2015  Book
Green, James A (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Oxon, Routledge, 2015.
Description xiv, 182p.: ill., figures, tableshbk
Series Routledge Studies in Conflict, Security and Technology
Standard Number 9781138793071
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058477355.4/GRE 058477MainOn ShelfGeneral 
3
ID:   145482


Establishment of a feasible cyber organization structure to enhance the capabilities of cyberspace operations in the ROK’s defe / Young-ju, Lee   Journal Article
Young-ju, Lee Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The paper discusses ways of establishing a feasible cyber organization for enhancing cyber response capabilities in defense of the ROK. To prepare for the rise of cyberspace as a war-combat domain, together with the realization that cyberspace is indispensable in fulfilling operational requirements, it is essential to search for and establish a new, suitable organization for cyberspace operations. To achieve this, the author suggests a design of an organization based on the so-called “three-party authority,” the ROK’s way of managing cyberspace, the difference in each echelon’s accountability for the fulfillment of the operational requirements—mission accomplishment for its commander as well as the characteristics of cyberspace. The article also presents validation and verification of the suggested composition of the cyber organization suitable for defense of the ROK to identify its pros and cons.
        Export Export
4
ID:   192639


Integrating cyber and electronic warfare: the new battlefield race / Tewari, Saurabh 2021  Book
Tewari, Saurabh Book
0 Rating(s) & 0 Review(s)
Publication Pune, Madhavi Prakashan, 2021.
Description 154p.pbk
Standard Number 9789354264825
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
060452355.343/TEW 060452MainOn ShelfGeneral 
5
ID:   152704


Tallinn manual 2.0 on the international law applicable to cyber operations / Schmitt, Michael N (ed.) 2017  Book
Schmitt, Michael N (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Cambridge, Cambridge University Press, 2017.
Description 598p.pbk
Contents prepared by the international group of experts at the invitation of the NATO cooperative cyber defence centre excellence
Standard Number 9781316630372
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059023341.6/SCH 059023MainOn ShelfGeneral 
6
ID:   166279


Understanding cyber warfare: politics, policy and strategy / Whyte, Christopher; Mazanec, Brian 2019  Book
Whyte, Christopher Book
0 Rating(s) & 0 Review(s)
Publication Oxon, Routledge, 2019.
Description x, 296p.: ill.pbk
Standard Number 9781138640627
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059644355.4/WHY 059644MainOn ShelfGeneral