Search Results: 'Information Warfare'

Search

×
×
×
×
147 results for "Information Warfare"
The Exigencies Of Global, Integrated Warfare: The Evolving Role Of The Cjcs And His Dedicated Staff By Michael S. Bell & Strategic Studies Institute
Paperback: $14.98
Prints in 3-5 business days
The post-9/11 security environment and the demands of global, integrated operations and campaigns in a long-term war on terrorism underscore the need to consider new ideas that enhance the... More > effectiveness of the military instrument of power while recognizing the inherent value of the existing system. In order to better understand the character and enduring attributes of the position of Chairman of the Joint Chiefs of Staff and inform future Defense reform initiatives in the post 9/11 era, Lieutenant Colonel Michael S. Bell traces the Chairman’s evolving role since the inception of the position during the Second World War through the Goldwater-Nichols reforms of the 1980s. Although Defense reformers often focus on more efficient business and budgeting practices, his narrative compels greater consideration of the value of apolitical military advice, civilian direction of policy, and legislative oversight on the military instrument of power.< Less
Cyberspace and Electronic Warfare Operations (FM 3-12) By Headquarters Department of the Army
Paperback: $12.95
Prints in 3-5 business days
Field Manual FM 3-12 (FM 3-38) Cyberspace and Electronic Warfare Operations April 2017 Over the past decade of conflict, the U.S. Army has deployed the most capable communications systems in its... More > history. U.S. forces dominated cyberspace and the electromagnetic spectrum (EMS) in Afghanistan and Iraq against enemies and adversaries lacking the technical capabilities to challenge our superiority in cyberspace. However, regional peers have since demonstrated impressive capabilities in a hybrid operational environment that threaten the Army’s dominance in cyberspace and the EMS. The Department of Defense information network-Army (DODIN-A) is an essential warfighting platform foundational to the success of all unified land operations. Effectively operating, securing, and defending this network and associated data is essential to the success of commanders at all echelons. We must anticipate that future enemies and adversaries will persistently attempt to infiltrate, exploit, and degrade access to our networks...< Less
Naval Warfare Publication - Underway Replenishment (NWP 4-01.4) By Department of The Navy
Paperback: $36.50
Prints in 3-5 business days
The information contained in NWP 4-01.4, Underway Replenishment, is directed toward preparing both the replenishment and customer ship for a replenishment evolution. Detailed rig make-up, requisite... More > equipment, and standardized procedures are established to serve as specific guidelines for all aspects of replenishment at sea. NWP 4-01.4 has evolved over the years as a direct result of continuing fleet requirements to standardize procedures, furnish rig make-up guidance, and provide continuity in application and use. The highest degree of professional competence in UNREP evolutions is required for their safe and efficient conduct. Each ship shall ensure wide dissemination to all personnel involved in the planning of, supervision of, and participation in UNREP evolutions.< Less
Spiritual Warfare During Your Sleep: Dealing With Dream Invaders By Alisha Anderson
eBook (PDF): $1.97
Spiritual Warfare During Your Sleep, explains how the enemy attempts to pollute the dream life of unsuspecting victims. This book provides information to help you recognize when the enemy is... More > launching an attack, stealing from you, or afflicting you with sickness during the sleeping hours. Once you know how to deal with dreams that are being manipulated, you can pray specifically to cancel them and obtain your victory. When you gain a deeper understanding and learn how to deal with these type of dreams you will experience greater triumphs in your life. This book includes prayers to break curses of poverty, sickness, etc., and tools to help you interpret your dreams. After reading this book you'll experience deliverance and increase revelations in understanding dream warfare. You shall pursue, overtake and recover all that was stolen from you (1 Sam 30:8), in Jesus Name.< Less
The 2006 Lebanon Campaign And The Future Of Warfare: Implications For Army And Defense Policy By Strategic Studies Institute et al.
Paperback: $17.51
Prints in 3-5 business days
Hezbollah’s conduct of its 2006 campaign in southern Lebanon has become an increasingly important case for the U.S. defense debate. Some see the future of warfare as one of nonstate opponents... More > employing irregular methods, and advocate a sweeping transformation of the U.S. military to meet such threats. Others point to the 2006 campaign as an example of a nonstate actor nevertheless waging a state-like conventional war, and argue that a more traditional U.S. military posture is needed to deal with such enemies in the future. This monograph, by Dr. Stephen Biddle of the Council on Foreign Relations and Mr. Jeffrey Friedman, Harvard Kennedy School of Government, seeks to inform this debate by examining in detail Hezbollah’s conduct of the 2006 campaign. The authors use evidence collected from a series of 36 primary source interviews with Israeli participants in the fighting who were in a position to observe Hezbollah’s actual behavior in the field in 2006...< Less
A Survey of Tank Warfare In Europe from 6 June to 12 August 1944 By H.G. Gee
eBook (ePub): $2.99
Merriam Press World War 2 History No. 23. First eBook Edition, 2015. This is a new edition of British Army Operational Research Group (AORG) Memorandum No. C6 originally issued in 1952. This study... More > was undertaken in order to examine the supposition that weight of numbers was the deciding factor in tank battles after 1942. Coverage begins with the historical aspect of the armored fighting in Normandy, followed by an analysis of tank actions, and applies the results to possible future war with the Soviets. CONTENTS: (1) The Historical Aspect of the Fighting in Normandy (2) Analysis of Tank Actions (3) Application of Results to Possible Future War (Appendix 1) Sources of Information (Appendix 2) Summary of Actions and General Analysis (Appendix 3) Estimated Strengths of German Formations 19 July 1944 (Appendix 4) Enemy Dispositions 16 July 1944. 3 cover photos, 4 maps, 9 tables.< Less
The Evolution Of Los Zetas In Mexico And Central America: Sadism As An Instrument Of Cartel Warfare By George W. Grayson et al.
Paperback: $17.50
Prints in 3-5 business days
Los Zetas, which appeared on the scene in the late-1990s, have raised the bar for cruelty among Mexican Mafiosi. Traditionally, the country’s narcotics cartels maximized earnings by working... More > hand-in-glove with police, military officers, intelligence agencies, union leaders, and office holders affiliated with the Institutional Revolutionary Party (PRI), which dominated the political landscape from 1929 to 2000. An informal set of rules benefited both the drug capos and their allies in government posts. On the one hand, officials raked in generous payments from the malefactors for turning a blind eye to—or employing the Federal Judicial Police and other agencies to facilitate—the growing, storage, processing, and export of marijuana, cocaine, heroin, and methamphetamines. In return for this treatment, the kingpins were expected to keep their substances away from children, leave civilians (and especially Americans) alone, and limit their arsenals to weapons less powerful than those possessed by the armed forces.< Less
Dark Guest Training Games for Cyber Warfare Volume 1 Wargaming Internet Based Attacks By John Curry & Tim Price MBE
Paperback: $22.37
Prints in 3-5 business days
Dark Guest contains five separate games for use in education about cyber warfare and information security. The games cover a range of topics from defending a single company to an exercise about a... More > nation state under cyber based attack. The games include: Enterprise Defender: Protecting a Modern Business All Your Secrets Are Belong to Us: a Matrix Game Conspiracy! The Card Game Media Wars: The Battle to Dominate the Information Space Tallinn Soldier: A Sample National Crisis Game Based in Estonia in 2007 The authors have many years experience in information management, cyber warfare and game design. John Curry is an academic and editor of the History of Wargaming Project. Tim Price MBE is an army officer with over 25 years experience in simulation and gaming. Together they bring their experience together to create a valuable resource for education and training.< Less
Complete Urban Warfare FM 3-06 & TC 90-1 By Department of the Army
Paperback: $28.52
Prints in 3-5 business days
This thick book is actually TWO U.S. Army field manuals: Urban Operations (FM 3-06) and Training for Urban Operations (TC 90-1). The combination of these two books makes for a complete, informative... More > masterpiece on urban combat that costs less than buying both books individually.< Less
Volume 6833, Timeline of women in warfare from 1750 until 1799 in America --- Time Air By Print Wikipedia
Hardcover: $80.00
Prints in 3-5 business days
Volume 6833, Timeline of women in warfare from 1750 until 1799 in America---Time Air Print Wikipedia is a both a utilitarian visualization of the largest accumulation of human knowledge and a poetic... More > gesture towards the inhuman scale of big data. Michael Mandberg wrote software that parses the entirety of the English-language Wikipedia database and programmatically lays out nearly 7500 volumes, complete with covers, and then uploads them to Lulu.com for print-on-demand. Print Wikipedia draws attention to the sheer size of the encyclopedia's content and the impossibility of rendering Wikipedia as a material object in fixed form: Once a volume is printed it is already out of date. It is also a work of found poetry built on what is likely the largest appropriation ever made. As we become increasingly more dependent on information and source material on the Internet today, Mandiberg explores the accessibility of its vastness.< Less

Top 10

see more >
 
 
 
4
API Security API Security By Lee Brandt et al.
Paperback: $19.00
 
 
 
 
 
 
 
 
 
 
 
 
10