1325 results in Communications, Information Theory and Security
6 - Trust management in communication networks
- from II - E-system and network security tools
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 119-142
-
- Chapter
- Export citation
9 - E-commerce security
- from III - E-security applications
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 196-217
-
- Chapter
- Export citation
5 - Information Warfare Against Command and Control
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 102-124
-
- Chapter
- Export citation
List of Figures
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp x-x
-
- Chapter
- Export citation
6 - Friendly Conquest in Cyberspace
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 125-168
-
- Chapter
- Export citation
Acknowledgments
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp xi-xii
-
- Chapter
- Export citation
8 - Retail Conquest in Cyberspace
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 193-219
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 1-14
-
- Chapter
- Export citation
10 - Talking Conquest in Cyberspace
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 231-255
-
- Chapter
- Export citation
9 - From Intimacy, Vulnerability
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 220-230
-
- Chapter
- Export citation
3 - Information Warfare as Noise
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 50-72
-
- Chapter
- Export citation
Index
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 307-323
-
- Chapter
- Export citation
Conquest in Cyberspace
- National Security and Information Warfare
-
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007
7 - Friendly Conquest Using Global Systems
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 169-192
-
- Chapter
- Export citation
11 - Managing Conquest in Cyberspace
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 256-290
-
- Chapter
- Export citation
4 - Can Information Warfare Be Strategic?
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 73-101
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp i-iv
-
- Chapter
- Export citation
Appendix A - Why Cyberspace Is Likely to Gain Consequence
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 291-306
-
- Chapter
- Export citation
2 - Hostile Conquest as Information Warfare
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp 15-49
-
- Chapter
- Export citation
Contents
-
- Book:
- Conquest in Cyberspace
- Published online:
- 05 June 2012
- Print publication:
- 16 April 2007, pp v-ix
-
- Chapter
- Export citation