Sometimes a simple thinking exercise will allow an individual to consider the relative merits of an...
The floods are almost bad enough, but to bring people up to speed who might have missed...
An idea that “Haft of the Spear” had was to blog tank a policy paper. With a...
I realize that many people have incurred incredible loss and are devastated by the flooding caused by...
Driving into the grocery store today I took some pictures. . Looking around I grabbed one screen...
Media reports have created a meme that any or all conflict that occurs in cyber space is...
I have been thinking a lot about the 2 conventions we have witnessed in the past 2...
This year my spousal accessory unit and I have been engaged in a limited trial of upside...
Some links to items we discussed in class and some background materials. I included a sampling of...
A quick point to define some ideas looking at Web 2.0 and the possibility that somebody could...
The following is a partial bibliography of topics related to computer or cyber forensics.
Some of the cases we discussed tonight can be found at the following links. Steve Jackson Games...
Where in the hierarchy of information operations does cyber warfare belong? What is the definition of information...
Welcome students to the fall semester. You will find all of this information on the WebCT course....
Welcome students to the fall semester. You will find all of this information on the WebCT...