This report presents an open source analysis of North Korea's cyber operations capabilities and its strategic impli
157 28 1MB
English Pages 106 Year 2016
Report DMCA / Copyright
DOWNLOAD FILE
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn t
565 94 27MB Read more
This book explains how various forms of artificial intelligence, namely machine learning, natural language processing, a
548 48 7MB Read more
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernizati
764 101 383KB Read more
An ideal textbook for classes on modern airpower and joint operations.
1,852 66 4MB Read more
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s missio
142 99 25MB Read more
This comprehensive work focuses on the current state of play regarding cyber security threats to government and business
460 80 3MB Read more
Now in its fifth edition, this clear, well-structured and interesting text offers insight into the more advanced topic o
1,306 131 10MB Read more
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systemati
2,724 81 3MB Read more
1,128 85 12MB Read more
This book explores the future of cyber technologies and cyber operations which will influence advances in social media,
141 82 1MB Read more