So, first thing is what do we mean by operationalize? This is a big word for the...
The author Ronald Krutz takes the reader through the various elements of cyber security as it is...
Reconnaissance is often considered synonymous with footprinting of systems. The idea is to get as much knowledge...
“Cyberpower and National Security” edited by Fraklin D. Kramer, Stuart H. Starr, and Larry K. Wentz is...
Our first update has lots of new developments! This is one of my favorites parts of growing...
In the Summer of 2008, we tried something a little different for the garden. We knew we...
It slices, dices, mixes, mashes, julienne fries, stirs and when you’re done lights venture capital cash on...
My address if I was asked to give one to my graduates. Today each graduate steps from...
Subject to change, no warranty expressed or implied, who knows if all these books are even available,...
There are some basic components that are needed by any military so that they can succeed. The...
Cyber warfare claimed by many is done by none. Most of the stuff identified as cyber warfare...
I’ve been tagged in the tourney of home offices by my esteemed colleague Shane. This little round...
There are large numbers of people who are all for the new thing called cyber warfare. Whether...
Cyber warfare is fought on a cyber space terrain. The terrain is made up of the communication...
As part of the experiential learning process students work is posted for comment. Feedback in the comments...