cyber bibliography 2012
TRANSCRIPT
-
7/29/2019 Cyber Bibliography 2012
1/13
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/ -
7/29/2019 Cyber Bibliography 2012
2/13
CYBER DEFENCE BIBLIOGRAPHY
Page 1
The following open-source links have been carefully selected and amalgamated by Defence IQ as a
basis for research into the cyber security and cyber warfare domain. All listed documents have
been produced in 2012 or within the previous two years. We hope you find them useful.
Visit www.DefenceIQ.com to find out about the latest events and conferences in our annual
international Cyber series.
Direct Links
White Papers and Policies 2
Articles, Essays and Data Sheets 4
Think Tanks, Blogs and Research Sites 5
Podcasts, Videos and Webinars 6
Fascinating Timelines 7
Discover More
Cyber Defence Forum 2012 8
Our Media Partners 9
About Defence IQ 12
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.defenceiq.com/http://www.defenceiq.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/ -
7/29/2019 Cyber Bibliography 2012
3/13
WHITE PAPERS AND POLICIES
Page 2
US Cyber Security Act 2012 (rejected Aug 2012)
Wired.com, 2012
How Boards & Senior Executives Are Managing Cyber Risks
Jody R. Westby, CyLab, Carnegie Mellon University, May 2012
Business and the Cyber Threat: Curiously Confident?
BAE Systems Detica Cyber Security Monitor, May 2012
Emerging Cyber Threats Report 2012
Georgia Tech, October 2011
Best Practices for Keeping Your Home Network Safe
The Information Assurance Mission at NSA (U.S. National Security Agency),April 2011
Roadmap: Proposal on a European Strategy for Internet Security
European Union, November 2011
The UK Cyber Security StrategyUK Cabinet Office, November 2011
Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in
the Information Space (in Russian)
Ministry of Defence of the Russian Federation, 2011
Cyber Defence Incident Management
Finmeccanica Cyber Solutions, February 2012
Cybersecurity: Authoritative Reports and Resources
Congressional Research Services,June 2012
Literature on Terrorism, Media, Propaganda & Cyber-Terrorism
Selected works, Perspectives on Terrorism, Vol 6, 2012
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.wired.com/images_blogs/threatlevel/2012/02/CYBER-The-Cybersecurity-Act-of-2012-final.pdfhttp://www.rsa.com/innovation/docs/CMU-GOVERNANCE-RPT-2012-FINAL.pdfhttp://www.baesystemsdetica.com/uploads/resources/DETICA_CYBER_SECURITY_MONITOR_2012_-_FINAL.pdfhttp://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdfhttp://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdfhttp://ec.europa.eu/governance/impact/planned_ia/docs/2012_infso_003_european_internet_security_strategy_en.pdfhttp://www.cabinetoffice.gov.uk/resource-library/cyber-security-strategyhttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdfhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.cabinetoffice.gov.uk/resource-library/cyber-security-strategyhttp://ec.europa.eu/governance/impact/planned_ia/docs/2012_infso_003_european_internet_security_strategy_en.pdfhttp://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdfhttp://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdfhttp://www.baesystemsdetica.com/uploads/resources/DETICA_CYBER_SECURITY_MONITOR_2012_-_FINAL.pdfhttp://www.rsa.com/innovation/docs/CMU-GOVERNANCE-RPT-2012-FINAL.pdfhttp://www.wired.com/images_blogs/threatlevel/2012/02/CYBER-The-Cybersecurity-Act-of-2012-final.pdf -
7/29/2019 Cyber Bibliography 2012
4/13
Page 3
sKyWIper (a.k.a. Flame a.k.a FLAMER: A complex malware for targeted attacks)
Laboratory of Cryptography and System Security (CrySyS Lab), May 2012
The European Model United Nations 2012 / NATO: Cyber SecurityTeimun.org, 2012
Digital Forensics for IaaS Cloud Computing
Josiah Dykstra, UMBC Cyber Defense Lab presentation,June 2012
Stuxnet: What has changed?
Dorothy E.Denning, Naval Postgraduate School,July 2012
Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre
European Commission, March 2012
Measuring the Cost of Cybercrime
Various, WEIS EconInfoSec, 2012
Potential new global legal mechanisms on combating cybercrime and global cyber attacks
Judge Stein Scholberg, cybercrimelaw.net, December 2011
WHITE PAPERS AND POLICIES
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.crysys.hu/skywiper/skywiper.pdfhttp://teimun.org/sites/default/files/files/NAC,%20Cyber%20Security.pdfhttp://computer-forensics.sans.org/summit-archives/2012/digital-forensics-for-iaas-cloud-computing.pdfhttp://faculty.nps.edu/dedennin/publications/Stuxnet%20-%20What%20Has%20Changed%20-%20Future%20Internet%20-%20final.pdfhttp://ec.europa.eu/home-affairs/doc_centre/crime/docs/Communication%20-%20European%20Cybercrime%20Centre.pdfhttp://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdfhttp://cybercrimelaw.net/documents/ISPAC.pdfhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://cybercrimelaw.net/documents/ISPAC.pdfhttp://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdfhttp://ec.europa.eu/home-affairs/doc_centre/crime/docs/Communication%20-%20European%20Cybercrime%20Centre.pdfhttp://faculty.nps.edu/dedennin/publications/Stuxnet%20-%20What%20Has%20Changed%20-%20Future%20Internet%20-%20final.pdfhttp://computer-forensics.sans.org/summit-archives/2012/digital-forensics-for-iaas-cloud-computing.pdfhttp://teimun.org/sites/default/files/files/NAC,%20Cyber%20Security.pdfhttp://www.crysys.hu/skywiper/skywiper.pdf -
7/29/2019 Cyber Bibliography 2012
5/13
ARTICLES, ESSAYS AND DATA SHEETS
Page 4
On the Theory of Cyberspace
Jeffrey L. Caton, published in US Army War College Guide to National Security Issues. Vol. 1:
Theory of War and Strategy, chapter 23, Part III, pp. 325-343,June 2012
Strategic Cyber Defense: Which Way Forward?
Kenneth Geers, Cooperative Cyber Defence Centre of Excellence, U.S. Naval Criminal
Investigative Service, 2012
Cyber Defence Infographics Archive
Josie Goytisolo, pinterest.com board Cyber Security/Smart Grid, updated 2012
Red Dragon Rising Cyber Threat Intelligence Feed
William Hagestad, updated regularly
Are we heading towards a Digital 9/11?
Richard de Silva, Defence IQ, November 2011
Statement on NASA Cybersecurity investigation to the US House of Representatives
Paul K. Martin, February 2012
Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace fit?
Vincent Manzo, Institute for National Strategic Studies (INSS), December 2011
Military Website Spoofing Is No Lauging Matter: Enhaced vigilance is required as defense web
pages face greater threats
Rita Boland, SIGNAL Magazine, pp. 47-50, December 2011
Network Security Article ArchiveWindowSecurity.com, Updated regularly
Indian Cyber Defence Article Archive
Times of India, Updated regularly
Everyone Should Pay for Cyber Defense
Martin Feldstein, Wall Street Journal,April 2012
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1109.pdfhttp://www.ccdcoe.org/articles/2012/Geers_StrategicCyberDefense.pdfhttp://pinterest.com/josiegg/cyber-security-smart-grid/http://red-dragonrising.com/latest-global-cyber-threat-intelligence-a-newshttp://www.defenceiq.com/defence-technology/articles/are-we-heading-towards-a-digital-9-11/http://oig.nasa.gov/congressional/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdfhttp://www.ndu.edu/inss/docUploaded/SF%20272_Manzo%20.pdfhttp://www.windowsecurity.com/articles/misc_network_security/http://articles.timesofindia.indiatimes.com/keyword/cyber-securityhttp://www.nber.org/feldstein/wsj04222012.pdfhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.nber.org/feldstein/wsj04222012.pdfhttp://articles.timesofindia.indiatimes.com/keyword/cyber-securityhttp://www.windowsecurity.com/articles/misc_network_security/http://www.ndu.edu/inss/docUploaded/SF%20272_Manzo%20.pdfhttp://oig.nasa.gov/congressional/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdfhttp://www.defenceiq.com/defence-technology/articles/are-we-heading-towards-a-digital-9-11/http://red-dragonrising.com/latest-global-cyber-threat-intelligence-a-newshttp://pinterest.com/josiegg/cyber-security-smart-grid/http://www.ccdcoe.org/articles/2012/Geers_StrategicCyberDefense.pdfhttp://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1109.pdf -
7/29/2019 Cyber Bibliography 2012
6/13
THINK TANKS, BLOGS AND RESEARCH SITES
Page 5
Chatham House, Cyber Security
Following their ground-breaking work on CNI vulnerabilities in the UK, the Chatham House
international security programme continues to dedicate itself to analysing the cyber domain,
identifying policy responses and establishing a knowledge base to inform policy-makers,
government, industry and wider society.
CWZ Blog (cyberwarzone.com)
A standout resource amongst CyberWarZones multitude of blogs by a number of expert
thinkers.
FlyingPenguin.com
Highly informative blog written by a variety of veteran information security professionals. Run
by Davi Ottenheimer who has more than seventeen years' experience managing global
security operations and assessments, including a decade of leading incident response and
digital forensics.
Schneier on Security
Thoughts and analysis from Bruce Schneiers, internationally renowned security technologist
and author. Described by The Economistas a "security guru," he is best known as a refreshinglycandid and lucid security critic and commentator.
Center for Strategic and International Studies: Cybersecurity
Offering bipartisan policy solutions in various fields, CSIS also has a special focus on cyber.
Understanding the many issues related to building a comprehensive cybersecurity strategy
that recognizes the threat as one of the major national security problems facing the United
States while respecting American values related to privacy and civil liberties.
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.chathamhouse.org.uk/research/security/current_projects/cybersecurity/http://cyberwarzone.com/cyberwarfare_blogs/cwzhttp://www.flyingpenguin.com/http://www.schneier.com/http://csis.org/category/topics/technology/cybersecurityhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://csis.org/category/topics/technology/cybersecurityhttp://www.schneier.com/http://www.flyingpenguin.com/http://cyberwarzone.com/cyberwarfare_blogs/cwzhttp://www.chathamhouse.org.uk/research/security/current_projects/cybersecurity/ -
7/29/2019 Cyber Bibliography 2012
7/13
PODCASTS, VIDEOS AND WEBINARS
Page 6
Podcasts, Videos and Webinars
Cyber Defence Forum Resource Centre
Defence IQ videos & podcast library, Updated July 2012
Flame Malware Toolkit: An Overview (YouTube)
SourceFire Inc., Flame analysis 1 of 3, May 2012
Cyberwarfare: Separating Reality from Hype (ISN Podcast)
Interview with Dr Myriam Dunn Cavelty, October 2011
Chinas Cyber Capability: misconceptions and opportunities (YouTube)
William Hagestad, Oct 2011
Stuxnet: Americas Cyber War Offensive?
Richard Stiennon & Michael V. Hayden, Internet Advisor,June 2012
Cyber Defence: Law and Order in US CYBERCOM (YouTube)
LCDR Paul A Walker, US Navy JAGC, October 2011
Cyber Law, Hacktivism, Extradition and Oppressive Response (YouTube)
Prof. Peter Sommer,July 2011
CERT Podcast Series: Security for Business Leaders
CERT, Software Engineering Institute, Carnegie Mellon University, Updated regularly
Crash Podcast Series
Computing.co.uk, Updated regularly
NATO: Exercising together against cyber attacks (YouTube)
NATOchannel.TV, December 2011
Calls for rules of engagement for cyber conflict
BBC NewsNight, February 2012
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.cyberdefenceforum.com/Event.aspx?id=770984http://youtu.be/0f13hzKiihghttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://youtu.be/wIGF0kevTNEhttp://internetadvisor.net/2012/06/internet-advisor-sat-june-9-2012-4-6pm-american-cyber-war-offensive/http://www.youtube.com/watch?v=5_epPdTLsUQhttp://www.youtube.com/watch?v=FDg9keeiWSUhttp://www.cert.org/podcast/http://www.computing.co.uk/ctg/news/2168706/crash-podcast-cyber-security-concerns-sap-hana-4ghttp://youtu.be/RPXlu78kbUshttp://youtu.be/RPXlu78kbUshttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://youtu.be/RPXlu78kbUshttp://youtu.be/RPXlu78kbUshttp://www.computing.co.uk/ctg/news/2168706/crash-podcast-cyber-security-concerns-sap-hana-4ghttp://www.cert.org/podcast/http://www.youtube.com/watch?v=FDg9keeiWSUhttp://www.youtube.com/watch?v=5_epPdTLsUQhttp://internetadvisor.net/2012/06/internet-advisor-sat-june-9-2012-4-6pm-american-cyber-war-offensive/http://youtu.be/wIGF0kevTNEhttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://youtu.be/0f13hzKiihghttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.cyberdefenceforum.com/Event.aspx?id=770984 -
7/29/2019 Cyber Bibliography 2012
8/13
FASCINATING TIMELINES
Page 7
2012 Cyber Attacks Timeline Master Index
Paolo Passeri (Paul Sparrows), Hackmageddon,June 2012
Timeline of Anonymous and Affiliates Cyber Attacks
Diane Bartz, Reuters, March 2012
Privilege: A Timeline of Recent Cyber Attacks [Infographic]
Cyber-Arc, 2012
Cyber War: The Next Threat to National Security and What to Do About It
Jeremy Norman, Updated 2012
Stuxnet timeline
Langner Communications,July Dec 2010
Cyber Warfare in China timeline
Ars Technica, 1999-2009
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/http://www.huffingtonpost.com/2012/03/06/timeline-anonymous-cyber-attacks_n_1325459.htmlhttp://pinterest.com/pin/260645897154485515/http://www.historyofinformation.com/index.php?category=Military+%2F+Warfare+%2F+Cyberwarfarehttp://www.langner.com/en/2010/12/09/our-stuxnet-timeline/http://static.arstechnica.com/1-12-2010/chinese_hack_timeline.jpghttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://static.arstechnica.com/1-12-2010/chinese_hack_timeline.jpghttp://www.langner.com/en/2010/12/09/our-stuxnet-timeline/http://www.historyofinformation.com/index.php?category=Military+%2F+Warfare+%2F+Cyberwarfarehttp://pinterest.com/pin/260645897154485515/http://www.huffingtonpost.com/2012/03/06/timeline-anonymous-cyber-attacks_n_1325459.htmlhttp://hackmageddon.com/2012-cyber-attacks-timeline-master-index/ -
7/29/2019 Cyber Bibliography 2012
9/13
Page 8
CYBER DEFENCE FORUM 2012
View the full programme
23 - 25 October 2012, Prague
Join us at the Cyber Defence Forumand network with others in this critical field.
This event will run as a series of panel discussions and round tables, ensuring you get the answers to your questions and have
face to face time with experts and key decision-makers. This new and exciting format will also ensure that there is as increased
opportunity for audience participation meaning that the opportunity to share knowledge is increased further still.
Building on the great success of our last event in London, when over 150 senior officers, government officials and leading industry
contractors from 21 nations gathered to discuss the latest cyber issues, the Cyber Defence Forum will focus specifically on the
challenges, operations and solutions facing armed forces and governments as they formulate national strategies to keep theirdefensive and offensive cyber capabilities current and in-line with the international community.
Key areas of focus for 2012 include:
Building the Cyber Force. Learn how armed forces globally arelooking to bridge the human capabilities gap in cyber warfare
and IA practitioner.
Ensuring Proactive Defences. Explore how armed forces arelooking to shift their cyber defence from a reactive to proactive
approach, defending in depth with enhanced threat
intelligence gathering and risk analysis capabilities.
Civil Military Cooperation. Understand how to achieve thesuccessful coordination and pragmatic management of cyber
operations across the public - private / civilian military divide
both nationally and internationally.
Greater Legal Clarity & Rules of Engagement. Discuss the legalambiguity surrounding cyber warfare and the international
efforts to establish rules of engagement for practitioners in
future incidents.
Information Integrity and Agility. Discover how the latesttechnological innovations will allow increased information
availability and agility whilst ensuring that security remains a top
priority.
Predicting the Future Threat Environment. Identify how thelatest trends are projected and ensure that you are armed with
the knowledge to continually improve your systems and keep
abreast of the latest innovations.
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.cyberdefenceforum.com/redForms.aspx?id=770966&pdf_form=1http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/redForms.aspx?id=770966&pdf_form=1 -
7/29/2019 Cyber Bibliography 2012
10/13
Page 9
OUR MEDIA PARTNERS
armada
Website: www.armadainternational.com
armada is one of the world's leading defence publications and serves the air, sea and land
communities in 183 countries with technically-oriented, reference quality editorial coverage.
armada's circulation is audited annually by WEMF, the Swiss member of IFABC (International
Federation of Audit Bureaux for Circulation). The latest certificate, dated 12 December 2006,
determines a circulation of 22 573 copies.
armada is a magazine made by specialists for specialists, and is read by the top 15 decision-makers
in more than 120 countries.
Armed Forces International
Website: www.armedforces-int.com
Armed Forces International is a military information and suppliers directory delivering the latestdefence news and information to users around the world. The portal forms an invaluable business
resource for industry professionals, providing complete supplier profiles searchable by their
products and services. The features offered by Armed Forces International also include detailed
events and exhibition listings, videos and image galleries, supplier article publications, the latest
contracts and tenders along with job vacancies available within the industry.
Asian Military Review
Website: www.asianmilitaryreview.com
Asian Military Review is ABC audited largest circulated defence magazine in Asia-Pacific. Published
since 1993 its read by key decision makers in militaries with information, opinion & facts for
tracking & understanding defence developments worldwide for equipment, training, organisation &
doctrine issues critical to creation & sustainment of military forces.
ASDNews.com Be the first to know
Website:www.asdnews.com
ASDNews brings the latest aerospace, defence and security news from government, industry and
major news agencies around the world. Our service has over 60,000 active subscribers and 2 million
article readers per year.
ASDNews content is categorised in over 25 main news groups for example: Training & Simulation
News, or Unmanned Systems News making recent and related articles easy to find.
Subscribe to our free daily newsletter or weekly group newsletters on
www.asdnews.com/subscription
ContingencyToday
Website:www.contingencytoday.com/subscription_free.phpContingencyToday.com is dedicated to the challenges and opportunities of Critical National
Infrastructure protection. Its readership includes policy-makers, decision-influencers and middle
management implementers engaged in emergency planning, disaster recovery and infrastructure
protection including electronic attack and the sophisticated misuse of computer systems; physical
attacks by terrorist organisations and other criminals; the effects of climate change; and other
natural disasters, including pandemics, fire and flood. Register for FREE Subscription and
Complimentary Newsletter: (UK only)
www.contingencytoday.com/subscription_free.php
(Outside UK) mailto:[email protected]
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.armadainternational.com/http://www.armedforces-int.com/http://www.asianmilitaryreview.com/http://www.asdnews.com/http://www.asdnews.com/subscriptionhttp://www.contingencytoday.com/subscription_free.phphttp://www.contingencytoday.com/subscription_free.phpmailto:[email protected]://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.contingencytoday.com/subscription_free.phphttp://www.asdnews.com/http://www.asianmilitaryreview.com/mailto:[email protected]://www.contingencytoday.com/subscription_free.phphttp://www.contingencytoday.com/subscription_free.phphttp://www.asdnews.com/subscriptionhttp://www.asdnews.com/http://www.asianmilitaryreview.com/http://www.armedforces-int.com/http://www.armadainternational.com/ -
7/29/2019 Cyber Bibliography 2012
11/13
Page 10
Defence And Security Of India
Website: www.defencesecurityindia.com
DEFENCE AND SECURITY OF INDIA is India's only publication on national security, strategic affairs &
policy matters. The magazine focuses on national security issues through insightful & analytical
writing by top experts on national strategy, defence & security, diplomacy, foreign policy, economics,
energy security & nuclear deterrence with South Asian perspective.
Defence Professionals
Website:www.defpro.com
Defpro.com | a new opportunity to experience defence business at its finest!
defence.professionals would be delighted to assist you in improving your access to local as well as
international markets.
defpro.com is an online working community and intelligence resource for defence professionals,
providing current news, trends, analyses, and related services. Our international readership and
users, coming from all defence related fields of interest and technology, are a valuable audience.
defpro.com provides you with a fresh and comprehensive approach to reach industry partners as
well as political decision-makers.
Global Security Finance
Website: www.globalsecurityfinance.com
Global Security Finance, the online daily business news and financial data service, is the leading
independent source of information about the physical, cyber and identity security and defense
sectors. Our news team delivers real-time business news and identifies the latest and most relevant
regulatory and policy announcements, investment, M&A and new funds and fund closes. This news is
supplemented with opinion-pieces based on in-depth interviews with senior-level executives,
advisers, investors and policy-makers. Our premium suite of desktop and mobile services provides
access to subscription-based business news, transaction data (VC/PE, M&A) and a global directory of
professionals active in the sector. Global Security Finance also offers customized research and senior-
level networking events including the Homeland Security Finance Forum and the Cyber Security
Finance Forum.
Hakin9
Website:hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8
Hakin9 is a monthly downloadable IT security magazine. It provides invaluable and comprehensive
technical knowledge, which allows the reader to stay up to date with the latest IT security threats
and technologies. What makes this magazine so successful is its community base of countless expert
contributors. Hakin9 is a must read for any security professionals who wish to have a broad view of
their environment threats and the desire to proactively defend it by knowing the secrets that are
usually only shared between crackers. We publish 4 issues per month which gives 48 issues per year!
Buy year subscription and you also gain access to full archive from 2005! Just visit:
hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8
InfoSec News
Website:http://www.infosecnews.org/mailman/listinfo/isn
InfoSec News is a privately run, medium traffic list that caters to the distribution of information
security news articles. These articles come from such sources as newspapers, magazines and online
resources.
Subscribe to InfoSec News today and get a digest of the latest cyber security news direct to your
desk: www.infosecnews.org/mailman/listinfo/isn
CYBER DEFENCE FORUM MEDIA PARTNERS
Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com
http://www.defencesecurityindia.com/http://www.defpro.com/http://www.globalsecurityfinance.com/http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.infosecnews.org/mailman/listinfo/isnhttp://www.infosecnews.org/mailman/listinfo/isnhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.infosecnews.org/mailman/listinfo/isnhttp://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.globalsecurityfinance.com/http://www.defpro.com/http://www.infosecnews.org/mailman/listinfo/isnhttp://www.infosecnews.org/mailman/listinfo/isnhttp://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.globalsecurityfinance.com/http://www.defpro.com/http://www.defencesecurityindia.com/ -
7/29/2019 Cyber Bibliography 2012
12/13
Page 11
MoD Oracle
Website:www.modoracle.com
MoD Oracle is the leading independent military Internet portal in the UK. Crammed with up-to-the-
minute military news, job opportunities and reunions, the site also has specialist areas such as
resettlement, honours, welfare and finance, making it the default website for tens of thousands of
UK military personnel, serving and retired. MoD Oracle is used extensively by suppliers of goods andservices to the UK military as a shop window to keep the military community up to date with what is
available.
Military Systems & Technology
Website:www.militarysystems-tech.com
Military Systems & Technology is an on-line resource for the International Defence & Aerospace
Industry. It is a major platform for communication between buyers and sellers. It profiles the very
latest systems & technology from Defence Companies around the Globe. We pride ourselves on the
quality of service and welcome any enquiries.
Phone, +44 (0) 1398 351606
E-mail, [email protected]
Cyber Defence Forum 201223-25 October, Prague, The Netherlandswww.cyberdefenceforum.com
CYBER DEFENCE FORUM MEDIA PARTNERS
http://www.modoracle.com/http://www.militarysystems-tech.com/mailto:[email protected]://www.cyberdefenceforum.com/http://www.militarysystems-tech.com/http://www.modoracle.com/http://www.cyberdefenceforum.com/mailto:[email protected]:[email protected]:[email protected]://www.militarysystems-tech.com/http://www.militarysystems-tech.com/http://www.militarysystems-tech.com/http://www.modoracle.com/ -
7/29/2019 Cyber Bibliography 2012
13/13
ABOUT Defence IQ
Defence IQ is an authoritative news source for high quality and exclusivecommentary and analysis on global defence and military-related topics.Sourcing interviews and insights directly from senior military and industryprofessionals on air defence, cyber warfare, armoured vehicles, navaldefence, land defence and many more topics, Defence IQ is a uniquemultimedia platform to discuss and learn about the latest developmentswithin the defence sector.
So join over 60,000 defence professionals to access all the exclusive videointerviews, podcasts, articles and whitepapers that are available and updatedon a daily basis.
Join today for free by signing up on our website:
www.DefenceIQ.com
Connect with us through social media too, just follow the links below:
Twitter
LinkedIn
Google+
Facebook
Page 12
Cyber Defence Forum 201223-25 October, Praguewww cyberdefenceforum com
http://www.defenceiq.com/https://twitter.com/http://www.linkedin.com/groups/Defence-IQ-World-Defense-Community-1878638https://plus.google.com/u/0/115407664403790603972http://www.facebook.com/pages/Defence-IQ-Military-Community/100268723353859http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.facebook.com/pages/Defence-IQ-Military-Community/100268723353859https://plus.google.com/u/0/115407664403790603972http://www.linkedin.com/groups/Defence-IQ-World-Defense-Community-1878638https://twitter.com/http://www.defenceiq.com/