Cybersecurity & Infrastructure

Get the latest official Federal policy and guidance about cyberspace operations, and international electronic monitoring as key players in the future of U.S. diplomacy efforts to prevent global cyber conflicts and data leak attacks. Publications in this collection include Cyber Infrastructure Protection: Volume III, Social Media: The Fastest Growing Vulnerability to the Air Force Mission, and LCR, Like, Comment, Retweet: The State of the Military's Nonpartisan Ethic in the World of Social Media. Scroll down to view more titles.

38 items
Page 1 of 2
Intelligence Community Legal Reference Book, Winter 2020
Title:
Intelligence Community Legal Reference Book, Winter 2020

Intelligence Community Legal Reference Book, Winter 2020

FBI Story 2019
Title:
FBI Story 2019

FBI Story 2019

Challenges To Security In Space
Title:
Challenges to Security in Space

Challenges To Security In Space

FBI Story 2018
Title:
FBI Story 2018

FBI Story 2018

China's Strategic Support Force: A Force for a New Era
Title:
China's Strategic Support Force: A Force for a New Era

China's Strategic Support Force: A Force for a New Era

Silent Partners: Organized Crime, Irregular Groups, and Nation-States
Title:
Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Studies in Intelligence, Volume 62, No 4, (December 2018) UNCLASSIFIED: Journal of the American Intelligence Professioonal
Title:
Studies in Intelligence, Volume 62, No 4, (December 2018) UNCLASSIFIED: Journal of the American Intelligence Professional

Studies in Intelligence, Volume 62, No 4, (December 2018) UNCLASSIFIED: Journal of the American Intelligence Professioonal

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable
Title:
Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

Critical Infrastructure in Latin America: Connected, Dependent and Vulnerable

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas
Title:
"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

"Following the Money Trail" To Combat Terrorism, Crime, and Corruption in The Americas

Cybersecurity for Small Business
Title:
Cybersecurity for Small Business

Cybersecurity for Small Business

Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)
Title:
Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)

Studies in Intelligence: Journal of the American Intelligence Professional, Unclassified Extracts From Studies in Intelligence, Volume 62, Number 2 (June 2018)

The FBI Story 2017
Title:
The FBI Story 2017

The FBI Story 2017

Beyond Convergence: World Without Order
Title:
Beyond Convergence: World Without Order

Beyond Convergence: World Without Order

Net Cetera: Chatting With Kids About Being Online
Title:
Net Cetera: Chatting With Kids About Being Online

Net Cetera: Chatting With Kids About Being Online

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent
Title:
The Pentagon's Pivot: How Lead Users Are Transforming Defense Product Development

Pentagon Pivot: How Lead Users Are Transforming Defense Product Developent

Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11
Title:
Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11

Interviews of Witnesses Before the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi, Volume 11

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies
Title:
Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
Title:
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)
Title:
Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)
Title:
Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)
Title:
Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)
Title:
Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

National Interoperability Field Guide Version 1.6.1 June 2016
Title:
National Interoperability Field Guide Version 1.6.1 June 2016

National Interoperability Field Guide Version 1.6.1 June 2016

The FBI Story 2015
Title:
The FBI Story 2015

The FBI Story 2015

Pages

Back to Top