Works matching DE "CYBER intelligence (Computer security) -- Law %26 legislation"
Results: 6
Lessons from the Cold War: A Critical Examination of the Central Intelligence Agency, the Military, and the U.S. Foreign Policy with Melvin Goodman.
- Published in:
- 2013
- By:
- Publication type:
- Interview
CYBER!
- Published in:
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- By:
- Publication type:
- Article
Cybersecurity bills advance in House, Senate.
- Published in:
- Issues in Science & Technology, 2012, v. 28, n. 4, p. 23
- Publication type:
- Article
CYBERSECURITY SUPPORT OF INSIDER THREAT OPERATIONS: DOD REGULATION AND CONSTITUTIONAL COMPLIANCE.
- Published in:
- George Mason University Civil Rights Law Journal, 2019, v. 30, n. 1, p. 1
- By:
- Publication type:
- Article
A Tale of Two Dystopias: Order and Chaos on the Electronic Frontier.
- Published in:
- 2016
- By:
- Publication type:
- Speech
THE RED STORM IN UNCHARTED WATERS: CHINA AND INTERNATIONAL CYBER SECURITY.
- Published in:
- UMKC Law Review, 2014, v. 82, n. 4, p. 951
- By:
- Publication type:
- Article