1 "Air Force Web Site Shut Down As Hackers Gain Access, Change Files."




Скачать 295.25 Kb.
Название1 "Air Force Web Site Shut Down As Hackers Gain Access, Change Files."
страница1/5
Дата19.10.2012
Размер295.25 Kb.
ТипДокументы
  1   2   3   4   5
Pre-1997 Infowar Reference List


1. . "Air Force Web Site Shut Down As Hackers Gain Access, Change Files." The Wall Street Journal, dec 31, 1996
, p. 10.

2. "Black Boxes Rule... OK?" Jane's Defence Systems Modernization 9, no. 2 (1996): 5.

3. "C4ISR in Concert." Jane's Defence Weekly 26, no. 10 (1996): 61.

4. Communications Law - Compilation of Selected Acts Within the Jurisdiction of the Committee on Commerce. Washington, DC: Government Printing Office, 1995.

5. "Dawn of Information Age Will Change Military More Than Cold War's End." Aerospace Daily 174 (1995): 325.

6. . "Defence in the 21st Century." The Economist, 5 September 1992, pp. 3-22.

7. "Digitized Zypher Lifting Fog From No Man's Land: Army Pushes Information Warfare Transition." National Defense 80, no. 510 (1995): 32-33.

8. "EW Expands into Information Warfare." Aviation Week and Space Technology 141 (1994): 47-48.

9. "For the First Time, Copernicus Architecture Addresses Information Warfare." Aerospace Daily 174 (1995): 392.

10. "Going Beyond Real Time: the Next Step in Simulation." Aviation Week and Space Technology 141 (1994): 71.

11. "Information Warriors Raze Enemy's Vital Data Chains." National Defense 79 (1995): 30-31.

12. "New US Naval System "Effective and Suitable"." Jane's Defence Weekly 26, no. 10 (1996): 69.

13. "Risk Management Provides Vital Information Security." Signal 49 (1994): 25-28.

14. "Shipborne Systems Come Off-the-Shelf." Jane's Defence Weekly 25, no. 4 (1996): 30.

15. . "The Softwar Revolution." The Economist, 10 June 1995, pp. 5-20.

16. "US Translator That Speaks the Language." Jane's Defence Weekly 26, no. 2 (1996): 42.

17. "Virtual Reality Helps Build Frigate Bridge." Jane's Defence Weekly 25, no. 24 (1996): 45.

18. "Vision 2020." Jane's Defence Weekly 23, no. 23 (1995): 29-55.

19. Abel, Dawn. "Simulated War Games Evolve to Enable Combat Exercises." Signal 44, no. 11 (1990): 45-47.

20. Ackerman, Robert K. "Advanced Information Systems Impel Operational Technologies: Research Agency Provides a Charge to New Electronics Systems Ranging From Thoughtful Sensors to Faithful Computer Simulations." Signal 50 (1996): 41-43.

21. ———. "Businesses Face Threat of Information Warfare." Signal 50 (1996): 45-46.

22. ———. "Military Planners Gird for Information Revolution: the Joint Staff Envisions a Future Where Implementing New Technologies Is an Essential Part of Force Definition." Signal 49 (1995): 71-76.

23. ———. "Vital Intelligence Technologies Converge on Information Systems: Sharing Timely Data Across the Community Requires a Coherent Strategy for Implementing Edge Electronics." Signal 50 (1996): 35-37.

24. Adam, John A., and Glen Zorpette. "Gulf Legacy." IEEE Spectrum 28 (1991): entire issue.

25. Adams, David, and others. "The Public Switched Network: an Overview and Vulnerability Assessment." Air Command and Staff College, 1995.

26. Adams, James. "The Role of the Media." Ethnic Conflict and Regional Instability: Implications for US Policy and Army Roles and Missions. editors Robert L. Pfaltzgraff, and Richard H. Shultz, 161-69. Carlisle Barracks, PA: US Army War College, 1994.

27. Adcock, Ken, Marilyn M. Helms, and Kenny Jih Wen-Jang. "Information Technology: Can It Provide a Sustainable Competitive Advantage?" Information Strategy 9, no. 3 (1993): 10-15.

28. Aftergood, Steven. "The Soft-Kill Fallacy." Bulletin of the Atomic Scientists 50 (1994): 40-45.

29. Albano do Amarante, Jose Carlos. "The Automated Battle: a Feasible Dream?" Military Review 74 (1994): 58-61.

30. Alberts, David S. Defensive Information Warfare. Washington, DC: National Defense University Press, 1996.

31. ———. Defensive Information Warfare. Washington, DC: National Defense University, 1996.

32. ———. The Unintended Consequences of Information Age Technologies. Washington, DC: National Defense University Press, 1996.

33. Aldrich, Richard W. The International Legal Implications of Information Warfare. Colorado Springs, CO: Institute for National Security Studies, 1996.

34. Alexander, David. "Information Warfare and the Digitized Battlefield." Military Technology 19, no. 9 (1995): 57-59+.

35. Alexander, John B. "Antimaterial Technology." Military Review 69 (1989): 29-41.

36. Alexander, John. B. "Non-Lethal Defense: a Comprehensive Defense Strategy Providing Commanders New Options."SpaceCast 2020.

37. Alger, John I. "Declaring Information War: Early Training Crucial to Awareness." International Defense Review 29, no. 7 (1996): 54.

38. ———. "Declaring Information Warfare." Jane's International Defence Review 29 (1996): 54-55.

39. Allard, C. Kenneth. Command, Control, and the Common Defense. New Haven: Yale University Press, 1990.

40. ———. "The Future of Command and Control: Toward a Paradigm of Information Warfare." Turning Point: The Gulf War and U.S. Military Strategy. editors L. Benjamine Ederington, and Michael J. Mazarr, 161-92. Boulder, CO: Westview Press, 1995.

41. Allard, Kenneth. "Data Transforms Warfare: IW Poses New Challenges to Corporate Culture." Defense News 9, no. 24 (3003).

42. Allison, Graham T. Essence of Decision. New Haven, CT: Harper Collins, 1971.

43. Arnett, Eric H. "Welcome to Hyperwar." Bulletin of the Atomic Scientists 48, no. 7 (1992): 14-21.

44. Arnnett, Robert L., and Mary C. FitzGerald. "Restructuring the Armed Forces: the Current Soviet Debate." Journal of Soviet Military Studies 3, no. 2 (1990): 193-220.

45. Arquilla, John. "The Strategic Implications of Information Dominance." Strategic Review 22, no. 3 (1994): 24-30.

46. Arquilla, John, and David Ronfeldt. The Advent of Netwar. Santa Monica, CA: RAND, 1996.

47. ———. "Cyberwar Is Coming!" Comparative Strategy 12 (1993): 141-65.

48. Arrow, Kenneth J. "Classificatory Notes on the Production and Transmission of Technological Knowledge." American Economic Review 59 (1969): 29-33.

49. ———. "Limited Knowledge and Economic Analysis." American Economic Review 64 (1974): 1-10.

50. Ayers, Robert L. "DISA and Information Warfare."InfoWar Con 1995, H3-H58.

51. Barker, Patrick K. Avoiding Technology-Induced Delusions of Grandeur: Preparing the Air Force for an Information Warfare Environment. Colorado Springs, CO: Institute for National Security Studies, 1996.

52. Barlow, John P. "A Taxonomy of Information." Bulletin of the Atomic Scientists 20 (1994): 13-17.

53. " Political Warfare and Psychological Operations: Rethinking the U.S. Approach, editors Frank R. Barnett, and Carnes Lord. Washington, DC: National Defense University Press, 1989.

54. Barnett, Jeffery R. Future War: an Assessment of Aerospace Campaigns in 2010. Maxwell AFB, AL: Air University Press, 1996.

55. Barnett, Jeffrey R. "The Revolution in Military Affairs."SpaceCast 2020.

56. Barraclough, Geoffrey. "Eric Voegelin and the Theory of Imperialism." The Philosophy of Order: Essays on History, Consciousness and Politics. editors Peter J. Opitz, and Gregor Sebba, 173-89. Stuttgart, GE: Klett-Cotta, 1981.

57. Bean, Mark H. "Fourth Generation Warfare?" Marine Corps Gazette 79, no. 3 (1995).

58. Beaumont, Roger A. The Nerves of War: Emerging Issues in and References to Command and Control. Washington, DC: AFCEA International Press, 1989.

59. Bell Communications Research. Generic Requirements for Data Communication Network Security. Bellcore, NJ: 1994.

60. " Computers in Battle: Will They Work?, editors David Bellin, and Gary Chapman. Boston: Harcourt Brace Jovanovich, 1987.

61. Bender, Brian. "Navy Chief Commissions Fleet Information Warfare Center." Defense Daily, 25 October 1995, pp. 108-9.

62. ———. "War on DoD's Information Systems Continues to Escalate." Defense Daily, 20 October 1995, pp. 89-90.

63. Benedikt, Michael. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991.

64. Beniger, James R. The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press, 1986.

65. Berenson, Paul J. "Knowledge Based Warfare."Annual AFCEA Computing Conference.

66. Bergman, Kenneth R. "Space and the Revolution in Military Affairs." Marine Corps Gazette 79, no. 5 (1995): 58-60.

67. Berkowitz, Bruce D. "Warfare in the Information Age." Issues in Science and Technology (1995): 59-66.

68. Betts, Richard. Surprise Attack. Washington, DC: The Brookings Institution, 1982.

69. Beyerchen, Alan. "Clausewitz, Nonlinearity, and the Unpredictability of War." International Studies 17, no. 3 (1992-1993): 59-90.

70. " Fuzzy Models for Pattern Recognition: Methods That Search for Structures in Data, editors James C. Bezdek, and K. Pal Sankar. New York: IEEE, 1992.

71. Bickers, Charles. "Fighting on the EW Front." Jane's Defence Weekly 23, no. 21 (1995): 31.

72. Bickers. Charles. "PJOCS Is Technology Base for UK's Joint HQ." Jane's Defence Weekly 25, no. 24 (1996): 46.

73. Biddle, Tami Davis. "Handling the Soviet Threat: "Project Control" and the Debate on American Strategy in the Early Cold War Years." Journal of Strategic Studies 12, no. 3 (1989): 273-302.

74. Bielski, Tanya. "Air Force Chief Embraces Information Warfare." Defense Daily, 26 April 1995, pp. 125-26.

75. Billout, Guy. "Ask Me No Secrets, I'Ll Tell You No Lies." Security Management 38 (1994): 24-25+.

76. " Communication in the Age of Virtual Reality, editors Frank Biocca, and Mark R. Levy. Hillsdale, NJ: Erlbaum, 1995.

77. Bishop, Peter C. "Knowing the Future."Workshop on Futures Intelligence Methodologies.

78. ———. "Long-Term Forecasting."2025 Study.

79. Bitzinger, Richard, and Bates Gill. Gearing Up for High-Tech Warfare? Chinese and Taiwanese Defense Modernization and Implications for Military Confrontation Across the Taiwan Strait, 1995-2005. Washington, DC: Center for Strategic and Budgetary Assessments, 1996.

80. Bjorklund, Raymond C. The Dollars and Sense of Command and Control. Ft.McNair, DC: National Defense University Press, 1995.

81. Black, Peter. "Soft Kill: Fighting Infrastructure Wars in the 21st Century." Wired 1, no. 3 (1993): 49-50.

82. " A Sobering Look at the Contours of CyberspaceSteven K. Black. Ridgeway Viewpoints, 96-3. Pittsburg, PA: Ridgeway Center for International Studies, University of Pittsburg, 1996.

83. " This Page Under Construction: Information Warfare in the Post-Cold War WorldSteven K. Black. Ridgeway Viewpoints, 96-1. Pittsburg, PA: Ridgeway Center for International Security Studies, University of Pittsburg, 1996.

84. Blair, David. "How to Defeat the United States: the Operational Military Effects of the Proliferation of Weapons of Precise Destruction." Fighting Proliferation: New Concerns for the Nineties. editor Henry Sokolski, 75-94. Maxwell AFB, AL: Air University Press, 1996.

85. Blank, Stephen J. Reform and the Revolution in Russian Defense Economics. Carlisle Barracks, PA: U.S. Army War College, 1995.

86. Blazer, Ernest. "Information Is the Best Weapon." Navy Times 43 (1994): 8.

87. Bleecker, Samuel E. "The Virtual Organization." The Futurist 28 (1994): 9-12+.

88. Blokzeyl-Roth, Kathleen M. "Preparing the Battlefield - Volant Solo Shoots "Electron Bullets"." Perspectives 8, no. 1 (1992): 1+.

89. Bloom, Richard W. "Propaganda and Active Measures." Handbook of Military Psychology. editors Reuven Gal, and A. David Mangelsdorff, 693-709. Chichester, UK: John Wiley & Sons, 1991.

90. Blount, Kerry A. "Two-Part Component Strategy for Winning the Information War." Army 45 (1995): 10-11.

91. ———. "Wrestling With Information Warfare's Dark Side." Army 46 (1996): 9-12+.

92. Boar, Bernard H. The Art of Strategic Planning for Information Technology. New York: John Wiley & Sons, 1993.

93. Boatman, John. "ARPA Sharpen Up for Information Warfare." Jane's Defence Weekly 24, no. 7 (1995): 5.

94. ———. "The Jane's Interview: Larry Lynn (ARPA)." Jane's Defence Weekly 24, no. 10 (1995): 64.

95. Bodnar, John W. "Military-Technical Revolution: From Hardware to Information." Naval War College Review 46 (1993): 7-21.

96. Boorda, Jeremy M. "Leading the Revolution in C4I." Joint Force Quarterly , no. 9 (1995): 14-17.

97. Bowdish, Randall G. "The Revolution in Military Affairs: the Sixth Generation." Military Review 75, no. 6 (1995): 26-33.

98. Boyd, Morris J., and Michael Woodgerd. "Information Operations: Force XXI Operations." Military Review 74 (1994): 16-28.

99. Brandt, Daniel. "Infowar and Disinformation: From the Pentagon to the Net." NameBase Newsletter , no. 11 (1995).

100. Brewin, Bob, and Heather Harreld. "U.S. Sitting Duck, DOD Panel Predicts." Federal Computer Week 10, no. 33 (1996): 1, 32.

101. Brodie, Bernard. Strategy in the Missile Age. Princeton, NJ: Princeton University Press, 1965.

102. Brodie, Ricchard. Virus of the Mind: the New Science of the Meme. Seattle, WA: Integral Press, 1996.

103. Brown, Anthony C. Bodyguard of Lies. New York: Harper Collins, 1975.

104. Brown, M. "Information Warfare."Symposium Auswirkungen Neuer Waffentechnologien, 10-32Zentraler Forschungs-und Studienbereich: Amt für Studien und Übungen der Bundeswehr , 1996.

105. Buchan, Glenn. Information War and the Air Force: Wave of the Future? Current Fad?, RAND, 1996.

106. Builder, Carl H. The Icarus Syndrome: the Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force. New Brunswick, NJ: Transaction Publishers, 1994.

107. ———. Rethinking National Security and the Role of the Military. RAND Paper P-7943 ed. Santa Monica, CA: RAND, 1995.

108. Bunker, Robert J. "Advanced Battlespace and Cybermaneuver Concepts: Implications for Force XXI." Parameters 26, no. 3 (1996): 108-20.

109. ———. "Transition to Fourth Epoch War." Marine Corps Gazette 78 (1994): 20+.

110. Busey, James B. "Information Superiority Dashes Throny Power Projection Issues." Signal 49 (1994): 13.

111. ———. "Information Warfare Calculus Mandates Protective Action." Signal 49 (1994): 15.

112. ———. "Milstar Offers Tactical Information Dominance." Signal 48 (1994): 11.

113. Campbell, William H. "NTC to Test Digitization." Army 44 (1994): 34.

114. " The First Information War, Contributing editor Alan D. Campen. Fairfax, VA: AFCEA International Press.

115. Campen, Alan D. "Information Warfare Is Rife With Promise, Peril."
  1   2   3   4   5

Похожие:

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconThe Air Force Research Laboratory, Wright-Patterson Air Force Base, Ohio, is responsible for the implementation and management of the Air Force sbir program

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconWelcome to the irs 8(a) At a glance listing. By clicking on links in this document, you will leave the irs web site and enter a web site created and operated by

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconBan puts Onus on U. S. for Climate Change Talks `Breakthrough' (Bloomberg) The U. N.'s Hot Air on Climate Change (Time)

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconPredictive validity of the selection tests of the Royal Netherlands Air Force

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconLandfill Cover Selection for Operable Unit 2 (OU2) at Lowry Air Force Base

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconStcu is sending you a translated Broad Agency Announcement from afosr (us air Force Office of Scientific Research). This is a funding opportunity from the

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconЗапустить редактор FrontPage, он создаст пустую страницу, где Вы напечатайте “Моя Первая Страница”
Программы web разработки дают возможность создания web site любому человеку, включая тех которые не хотят или не имеют времени, чтобы...
1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconFresh out of the Air Force and a stint as a copy boy at “Time Magazine,” future Gonzo journalist Hunter S. Thompson moved down to San Juan, Puerto Rico in 1960

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconThe following information from the aap web site is located at

1 \"Air Force Web Site Shut Down As Hackers Gain Access, Change Files.\" iconAir Force Phase I and Phase II evaluation

Разместите кнопку на своём сайте:
Библиотека


База данных защищена авторским правом ©lib.znate.ru 2014
обратиться к администрации
Библиотека
Главная страница