• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 96
  • 96
  • 25
  • 19
  • 15
  • 15
  • 14
  • 14
  • 13
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Developing a reliable methodology for assessing the computer network operations threat of North Korea

Brown, Christopher 09 1900 (has links)
Approved for release; distribution is unlimited / Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation (CNE), and computer network defense (CND). Computer network attack is def operations to disrupt, deny, degrade, or destroy information resident in computer networks, or the computers and ne themselves. Computer network exploitation is the intelligence collection and enabling operations to gather data from adversary automated information systems (AIS) or networks. Finally, computer network defense are those me internal to the protected entity, taken to protect and defend information, computers, and networks from disruption, degradation, or destruction. No longer is warfare limited to the use of kinetic weapons and conventional methods of war. Computer network operations have become an integral part of our adversary's arsenal and more attention must be paid to the effects of CNO activities, particularly CNA and CNE being conducted by our adversaries. Of the many states suspected of conducting active CNO activities against the United States and other nations, none warrants more attention than North Korea. This thesis presents the development of methodology using information available from open sources. This work is intended to prove that a useful methodology for assessing the CNO capabilities and limitations of North Korea can be developed using only open source information. / Lieutenant, United States Navy
32

On strategy : the war on terror in context

Reed, Donald J. 03 1900 (has links)
CHDS State/Local / The War on Terror, as the outcome of the al Qaeda attacks on the World Trade Center and the Pentagon on September 11, 2001, promises to be the effort of a generation. If it is to win, the United States must approach it in a manner reminiscent of successes in past wars: with clearly defined and obtainable national objectives, and a unified national strategy to obtain those objectives. In addition, it must establish a clear long-term vision for transforming its efforts and its institutions from the industrial age to the information age as the new domain for waging war. This thesis examines the War on Terror from several perspectives. First, is the strategic context in which the war is being conducted, particularly the issues involved in its prosecution. Second, the Vietnam War and the War on Terror are examined in historical context to determine if the United States is repeating the strategic mistakes that led to its defeat in Vietnam. Third, transformation imperatives are identified which require the Nation to consider what it must do to win the War on Terror while simultaneously preparing for the emergence of greater forms of information age warfare. Finally, an adaptive capabilities-based approach is suggested for the United States to deal with the new strategic reality it faces. / Chief - G3 Military Support Division, First U.S. Army / U.S. Army (USA) author
33

none

Tang, Tien-fu 30 August 2009 (has links)
none
34

Cyberespionage 2010 : is the current status of espionage under international law applicable in cyberspace? /

Romero, Jorge H. January 2001 (has links) (PDF)
Thesis (L.L.M.)--Georgetown University, Law Center, 2001. / "30 April 2001." Includes bibliographical references. Also available via the Internet.
35

Information warfare an Air Force policy for the role of public affairs /

Crumm, Robin K. January 1900 (has links)
Thesis--School of Advanced Airpower Studies, Maxwell Air Force Base, Ala., 1996-97. / Title from title screen (viewed Oct. 10, 2003). "June 1996." Includes bibliographical references.
36

Information operations in strategic, operational, and tactical levels of war : a balanced systematic approach /

Tuner, Bunyamin. January 2003 (has links) (PDF)
Thesis (M.S. in Systems Engineering and M.S. in Information Technology Management)--Naval Postgraduate School, September 2003. / Thesis advisor(s): Daniel Boger, Steve Iatrou. Includes bibliographical references (p. 69-71). Also available online.
37

An Approach For Defensive Information Warfare In The Turkish Land Forces Command

Ozcan, Fuzuli 01 January 2003 (has links) (PDF)
In this study, Information Warfare (IW) and Information System (IS) security concept in the Turkish Land Forces Command (TLFC) are investigated. An approach that will enhance the success for a secure Information System to alleviate experienced risks is proposed. Starting with the general overview of the literature about IW and IS security, the relation between the concepts, the future, advantages and disadvantages of security development approaches, and the requirements for security are reviewed. Then the specific problems, security risks and IW threats of the TLFC are considered. After reviewing the specific problems, a proposal for IS security in Defensive Information Warfare process in the TLFC is presented and partially applied. The proposal is evaluated within the framework of a case study. The stronger points of the proposal are reviewed by comparing the proposed approach with some other approaches actually applied.
38

How can the U.S. military avoid another 9/15 : an analysis of the inability of U.S. military leaders to provide an adequate strategy for responding to the 9/11 attacks /

Mauldin, James R. January 1900 (has links)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, 2007. / Cover title. "December 2007." AD-A476 373. Includes bibliographical references. Electronic version available on the Public STINET.
39

Cyber power in the 21st century /

Elbaum, Joseph M. January 2008 (has links)
Thesis (M.S. )--Air Force Institute of Technology, 2008. / "December 2008." Vita. Includes bibliographical references (p. 97-103). Also available via the Internet.
40

FORCEnet : an analysis of the Trident Warrior 2003 exercise /

Lagana, John P. Unknown Date (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, 2004. / Thesis Advisor(s): Dan C. Boger. Includes bibliographical references (p. 73-74). Also available online.

Page generated in 0.1188 seconds