Cybersecurity & Infrastructure

Get the latest official Federal policy and guidance about cyberspace operations, and international electronic monitoring as key players in the future of U.S. diplomacy efforts to prevent global cyber conflicts and data leak attacks. Publications in this collection include Cyber Infrastructure Protection: Volume III, Social Media: The Fastest Growing Vulnerability to the Air Force Mission, and LCR, Like, Comment, Retweet: The State of the Military's Nonpartisan Ethic in the World of Social Media. Scroll down to view more titles.

64 items
Page 2 of 3
Prospects for the Rule of Law in Cyberspace
Title:
Prospects for the Rule of Law in Cyberspace

Prospects for the Rule of Law in Cyberspace

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies
Title:
Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

Deterring Cybertrespass and Securing Cyberspace: Lessons From United States Border Control Strategies

NATO Cyberspace Capability: A Strategic and Operational Evolution
Title:
NATO Cyberspace Capability: A Strategic and Operational Evolution

NATO Cyberspace Capability: A Strategic and Operational Evolution

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
Title:
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

Cyber Defense: An International View
Title:
Cyber Defense: An International View

Cyber Defense: An International View

Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications
Title:
Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications

Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition
Title:
Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

Gestion de Inteligencia en las Americas (Spanish Language)
Title:
Gestion de Inteligencia en las Americas (Spanish Language)

Gestion de Inteligencia en las Americas (Spanish Language)

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)
Title:
Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Pipeline Blast Mitigation Technologies: Final Technical Report (TSWG Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)
Title:
Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Trade Based Money Laundering Reference Guide (English Language Edition) (Package of 5) (Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)
Title:
Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

Tactical Site Exploitation (TSE) Training Support Package (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)
Title:
Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

Critical Infrastructure Database Catalog Version 2.0 (November 2008) CD (TSWG Controlled Item)

A Study of Active Shooter Incidents in the United States Between 2000 and 2013
Title:
A Study of Active Shooter Incidents in the United States Between 2000 and 2013

A Study of Active Shooter Incidents in the United States Between 2000 and 2013

National Interoperability Field Guide Version 1.6.1 June 2016
Title:
National Interoperability Field Guide Version 1.6.1 June 2016

National Interoperability Field Guide Version 1.6.1 June 2016

The FBI Story 2015
Title:
The FBI Story 2015

The FBI Story 2015

The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014
Title:
The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014

The Constitution of the United States of America, Analysis and Interpretation 2014 Supplement: Analysis of Cases Decided by the Supreme Court to July 1, 2014

National Traffic Incident Management Responder Training Program: Train-the-Trainer Guide
Title:
National Traffic Incident Management Responder Training Program: Train-the-Trainer Guide

National Traffic Incident Management Responder Training Program: Train-the-Trainer Guide

Stand Up and Fight]: The Creation of U.S. Security Organizations, 1942-2005
Title:
Stand Up and Fight]: The Creation of U.S. Security Organizations, 1942-2005

Stand Up and Fight]: The Creation of U.S. Security Organizations, 1942-2005

Toward a Unified Military Response: Hurricane Sandy and the Dual Status Commander
Title:
Toward a Unified Military Response: Hurricane Sandy and the Dual Status Commander

Toward a Unified Military Response: Hurricane Sandy and the Dual Status Commander

Operationalizing Counter Threat Finance Strategies
Title:
Operationalizing Counter Threat Finance Strategies

Operationalizing Counter Threat Finance Strategies

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications
Title:
Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications

Cyberterrorism After Stuxnet
Title:
Cyberterrorism After Stuxnet

Cyberterrorism After Stuxnet

Bank Secrecy Act/Anti-Money Laundering Examination Manual
Title:
Bank Secrecy Act/Anti-Money Laundering Examination Manual

Bank Secrecy Act/Anti-Money Laundering Examination Manual

Legality in Cyberspace: An Adversary View
Title:
Legality in Cyberspace: An Adversary View

Legality in Cyberspace: An Adversary View

Back to Top