This report presents an open source analysis of North Korea's cyber operations capabilities and its strategic impli
162 30 1MB
English Pages 106 Year 2016
Report DMCA / Copyright
DOWNLOAD FILE
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn t
572 95 27MB Read more
This book explains how various forms of artificial intelligence, namely machine learning, natural language processing, a
554 49 7MB Read more
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernizati
776 105 383KB Read more
An ideal textbook for classes on modern airpower and joint operations.
1,854 67 4MB Read more
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s missio
148 101 25MB Read more
This comprehensive work focuses on the current state of play regarding cyber security threats to government and business
483 82 3MB Read more
Now in its fifth edition, this clear, well-structured and interesting text offers insight into the more advanced topic o
1,324 132 10MB Read more
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systemati
2,751 81 3MB Read more
1,139 86 12MB Read more
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect
169 84 3MB Read more