Cyberwar-Netwar : security in the information age /
Cyberdeterrence and cyberwar /
Trust in cyberspace /
Managing information security /
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
North Korea's cyber operations : strategy and responses /
Once More Unto the Breach : Mangaging Information Security in an Uncertain World.
ISO 37001 : an Introduction to Anti-Bribery Management Systems.
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud /
Electronic warfare /
Spring Security.
PCI DSS : a pocket guide /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Cybersecurity and cyberwar : what everyone needs to know /
PCI DSS : a pocket guide.
Once more unto the breach : managing information security in an uncertain world /
Business continuity and disaster recovery planning for IT professionals /
Network security evaluation : using the NSA IEM /
Iso/iec 27001 : An Introduction to Information Security and the ISMS Standard.
Introduction to communication electronic warfare systems /
Occupying habits : everyday media as warfare in Israel and Palestine /
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /
Understanding commanders' information needs for influence operations /
Information warfare and organizational decision-making /
The evolution of cyber war : international norms for emerging-technology weapons /
Selling war : a critical look at the military's PR machine /
The Russian understanding of war : blurring the lines between war and peace /
Cyberwar and revolution : digital subterfuge in global capitalism /
21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors /
Cyberspace and national security : threats, opportunities, and power in a virtual world /
Intelligence and the function of government /
Subversion : the strategic weaponization of narratives /
RUSSIAN CYBER OPERATIONS coding the boundaries of conflict.
Russian cyber operations : coding the boundaries of conflict /
Digital influence warfare in the age of social media /
Crisis and escalation in cyberspace /
Electronic warfare target location methods /