cyber bibliography 2012

Upload: diogo-meira

Post on 03-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Cyber Bibliography 2012

    1/13

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/
  • 7/29/2019 Cyber Bibliography 2012

    2/13

    CYBER DEFENCE BIBLIOGRAPHY

    Page 1

    The following open-source links have been carefully selected and amalgamated by Defence IQ as a

    basis for research into the cyber security and cyber warfare domain. All listed documents have

    been produced in 2012 or within the previous two years. We hope you find them useful.

    Visit www.DefenceIQ.com to find out about the latest events and conferences in our annual

    international Cyber series.

    Direct Links

    White Papers and Policies 2

    Articles, Essays and Data Sheets 4

    Think Tanks, Blogs and Research Sites 5

    Podcasts, Videos and Webinars 6

    Fascinating Timelines 7

    Discover More

    Cyber Defence Forum 2012 8

    Our Media Partners 9

    About Defence IQ 12

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.defenceiq.com/http://www.defenceiq.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/http://www.defenceiq.com/
  • 7/29/2019 Cyber Bibliography 2012

    3/13

    WHITE PAPERS AND POLICIES

    Page 2

    US Cyber Security Act 2012 (rejected Aug 2012)

    Wired.com, 2012

    How Boards & Senior Executives Are Managing Cyber Risks

    Jody R. Westby, CyLab, Carnegie Mellon University, May 2012

    Business and the Cyber Threat: Curiously Confident?

    BAE Systems Detica Cyber Security Monitor, May 2012

    Emerging Cyber Threats Report 2012

    Georgia Tech, October 2011

    Best Practices for Keeping Your Home Network Safe

    The Information Assurance Mission at NSA (U.S. National Security Agency),April 2011

    Roadmap: Proposal on a European Strategy for Internet Security

    European Union, November 2011

    The UK Cyber Security StrategyUK Cabinet Office, November 2011

    Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in

    the Information Space (in Russian)

    Ministry of Defence of the Russian Federation, 2011

    Cyber Defence Incident Management

    Finmeccanica Cyber Solutions, February 2012

    Cybersecurity: Authoritative Reports and Resources

    Congressional Research Services,June 2012

    Literature on Terrorism, Media, Propaganda & Cyber-Terrorism

    Selected works, Perspectives on Terrorism, Vol 6, 2012

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.wired.com/images_blogs/threatlevel/2012/02/CYBER-The-Cybersecurity-Act-of-2012-final.pdfhttp://www.rsa.com/innovation/docs/CMU-GOVERNANCE-RPT-2012-FINAL.pdfhttp://www.baesystemsdetica.com/uploads/resources/DETICA_CYBER_SECURITY_MONITOR_2012_-_FINAL.pdfhttp://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdfhttp://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdfhttp://ec.europa.eu/governance/impact/planned_ia/docs/2012_infso_003_european_internet_security_strategy_en.pdfhttp://www.cabinetoffice.gov.uk/resource-library/cyber-security-strategyhttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdfhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media/htmlhttp://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce-Framework-printable.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.finmeccanica.co.uk/PDF/FCS%20-%20Cyber%20Defence%20-%20Incident%20Management_c.pdfhttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.ens.mil.ru/science/publications/more.htm?id=10845074@cmsArticlehttp://www.cabinetoffice.gov.uk/resource-library/cyber-security-strategyhttp://ec.europa.eu/governance/impact/planned_ia/docs/2012_infso_003_european_internet_security_strategy_en.pdfhttp://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdfhttp://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdfhttp://www.baesystemsdetica.com/uploads/resources/DETICA_CYBER_SECURITY_MONITOR_2012_-_FINAL.pdfhttp://www.rsa.com/innovation/docs/CMU-GOVERNANCE-RPT-2012-FINAL.pdfhttp://www.wired.com/images_blogs/threatlevel/2012/02/CYBER-The-Cybersecurity-Act-of-2012-final.pdf
  • 7/29/2019 Cyber Bibliography 2012

    4/13

    Page 3

    sKyWIper (a.k.a. Flame a.k.a FLAMER: A complex malware for targeted attacks)

    Laboratory of Cryptography and System Security (CrySyS Lab), May 2012

    The European Model United Nations 2012 / NATO: Cyber SecurityTeimun.org, 2012

    Digital Forensics for IaaS Cloud Computing

    Josiah Dykstra, UMBC Cyber Defense Lab presentation,June 2012

    Stuxnet: What has changed?

    Dorothy E.Denning, Naval Postgraduate School,July 2012

    Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre

    European Commission, March 2012

    Measuring the Cost of Cybercrime

    Various, WEIS EconInfoSec, 2012

    Potential new global legal mechanisms on combating cybercrime and global cyber attacks

    Judge Stein Scholberg, cybercrimelaw.net, December 2011

    WHITE PAPERS AND POLICIES

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.crysys.hu/skywiper/skywiper.pdfhttp://teimun.org/sites/default/files/files/NAC,%20Cyber%20Security.pdfhttp://computer-forensics.sans.org/summit-archives/2012/digital-forensics-for-iaas-cloud-computing.pdfhttp://faculty.nps.edu/dedennin/publications/Stuxnet%20-%20What%20Has%20Changed%20-%20Future%20Internet%20-%20final.pdfhttp://ec.europa.eu/home-affairs/doc_centre/crime/docs/Communication%20-%20European%20Cybercrime%20Centre.pdfhttp://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdfhttp://cybercrimelaw.net/documents/ISPAC.pdfhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://cybercrimelaw.net/documents/ISPAC.pdfhttp://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdfhttp://ec.europa.eu/home-affairs/doc_centre/crime/docs/Communication%20-%20European%20Cybercrime%20Centre.pdfhttp://faculty.nps.edu/dedennin/publications/Stuxnet%20-%20What%20Has%20Changed%20-%20Future%20Internet%20-%20final.pdfhttp://computer-forensics.sans.org/summit-archives/2012/digital-forensics-for-iaas-cloud-computing.pdfhttp://teimun.org/sites/default/files/files/NAC,%20Cyber%20Security.pdfhttp://www.crysys.hu/skywiper/skywiper.pdf
  • 7/29/2019 Cyber Bibliography 2012

    5/13

    ARTICLES, ESSAYS AND DATA SHEETS

    Page 4

    On the Theory of Cyberspace

    Jeffrey L. Caton, published in US Army War College Guide to National Security Issues. Vol. 1:

    Theory of War and Strategy, chapter 23, Part III, pp. 325-343,June 2012

    Strategic Cyber Defense: Which Way Forward?

    Kenneth Geers, Cooperative Cyber Defence Centre of Excellence, U.S. Naval Criminal

    Investigative Service, 2012

    Cyber Defence Infographics Archive

    Josie Goytisolo, pinterest.com board Cyber Security/Smart Grid, updated 2012

    Red Dragon Rising Cyber Threat Intelligence Feed

    William Hagestad, updated regularly

    Are we heading towards a Digital 9/11?

    Richard de Silva, Defence IQ, November 2011

    Statement on NASA Cybersecurity investigation to the US House of Representatives

    Paul K. Martin, February 2012

    Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace fit?

    Vincent Manzo, Institute for National Strategic Studies (INSS), December 2011

    Military Website Spoofing Is No Lauging Matter: Enhaced vigilance is required as defense web

    pages face greater threats

    Rita Boland, SIGNAL Magazine, pp. 47-50, December 2011

    Network Security Article ArchiveWindowSecurity.com, Updated regularly

    Indian Cyber Defence Article Archive

    Times of India, Updated regularly

    Everyone Should Pay for Cyber Defense

    Martin Feldstein, Wall Street Journal,April 2012

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1109.pdfhttp://www.ccdcoe.org/articles/2012/Geers_StrategicCyberDefense.pdfhttp://pinterest.com/josiegg/cyber-security-smart-grid/http://red-dragonrising.com/latest-global-cyber-threat-intelligence-a-newshttp://www.defenceiq.com/defence-technology/articles/are-we-heading-towards-a-digital-9-11/http://oig.nasa.gov/congressional/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdfhttp://www.ndu.edu/inss/docUploaded/SF%20272_Manzo%20.pdfhttp://www.windowsecurity.com/articles/misc_network_security/http://articles.timesofindia.indiatimes.com/keyword/cyber-securityhttp://www.nber.org/feldstein/wsj04222012.pdfhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.nber.org/feldstein/wsj04222012.pdfhttp://articles.timesofindia.indiatimes.com/keyword/cyber-securityhttp://www.windowsecurity.com/articles/misc_network_security/http://www.ndu.edu/inss/docUploaded/SF%20272_Manzo%20.pdfhttp://oig.nasa.gov/congressional/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdfhttp://www.defenceiq.com/defence-technology/articles/are-we-heading-towards-a-digital-9-11/http://red-dragonrising.com/latest-global-cyber-threat-intelligence-a-newshttp://pinterest.com/josiegg/cyber-security-smart-grid/http://www.ccdcoe.org/articles/2012/Geers_StrategicCyberDefense.pdfhttp://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1109.pdf
  • 7/29/2019 Cyber Bibliography 2012

    6/13

    THINK TANKS, BLOGS AND RESEARCH SITES

    Page 5

    Chatham House, Cyber Security

    Following their ground-breaking work on CNI vulnerabilities in the UK, the Chatham House

    international security programme continues to dedicate itself to analysing the cyber domain,

    identifying policy responses and establishing a knowledge base to inform policy-makers,

    government, industry and wider society.

    CWZ Blog (cyberwarzone.com)

    A standout resource amongst CyberWarZones multitude of blogs by a number of expert

    thinkers.

    FlyingPenguin.com

    Highly informative blog written by a variety of veteran information security professionals. Run

    by Davi Ottenheimer who has more than seventeen years' experience managing global

    security operations and assessments, including a decade of leading incident response and

    digital forensics.

    Schneier on Security

    Thoughts and analysis from Bruce Schneiers, internationally renowned security technologist

    and author. Described by The Economistas a "security guru," he is best known as a refreshinglycandid and lucid security critic and commentator.

    Center for Strategic and International Studies: Cybersecurity

    Offering bipartisan policy solutions in various fields, CSIS also has a special focus on cyber.

    Understanding the many issues related to building a comprehensive cybersecurity strategy

    that recognizes the threat as one of the major national security problems facing the United

    States while respecting American values related to privacy and civil liberties.

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.chathamhouse.org.uk/research/security/current_projects/cybersecurity/http://cyberwarzone.com/cyberwarfare_blogs/cwzhttp://www.flyingpenguin.com/http://www.schneier.com/http://csis.org/category/topics/technology/cybersecurityhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://csis.org/category/topics/technology/cybersecurityhttp://www.schneier.com/http://www.flyingpenguin.com/http://cyberwarzone.com/cyberwarfare_blogs/cwzhttp://www.chathamhouse.org.uk/research/security/current_projects/cybersecurity/
  • 7/29/2019 Cyber Bibliography 2012

    7/13

    PODCASTS, VIDEOS AND WEBINARS

    Page 6

    Podcasts, Videos and Webinars

    Cyber Defence Forum Resource Centre

    Defence IQ videos & podcast library, Updated July 2012

    Flame Malware Toolkit: An Overview (YouTube)

    SourceFire Inc., Flame analysis 1 of 3, May 2012

    Cyberwarfare: Separating Reality from Hype (ISN Podcast)

    Interview with Dr Myriam Dunn Cavelty, October 2011

    Chinas Cyber Capability: misconceptions and opportunities (YouTube)

    William Hagestad, Oct 2011

    Stuxnet: Americas Cyber War Offensive?

    Richard Stiennon & Michael V. Hayden, Internet Advisor,June 2012

    Cyber Defence: Law and Order in US CYBERCOM (YouTube)

    LCDR Paul A Walker, US Navy JAGC, October 2011

    Cyber Law, Hacktivism, Extradition and Oppressive Response (YouTube)

    Prof. Peter Sommer,July 2011

    CERT Podcast Series: Security for Business Leaders

    CERT, Software Engineering Institute, Carnegie Mellon University, Updated regularly

    Crash Podcast Series

    Computing.co.uk, Updated regularly

    NATO: Exercising together against cyber attacks (YouTube)

    NATOchannel.TV, December 2011

    Calls for rules of engagement for cyber conflict

    BBC NewsNight, February 2012

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.cyberdefenceforum.com/Event.aspx?id=770984http://youtu.be/0f13hzKiihghttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://youtu.be/wIGF0kevTNEhttp://internetadvisor.net/2012/06/internet-advisor-sat-june-9-2012-4-6pm-american-cyber-war-offensive/http://www.youtube.com/watch?v=5_epPdTLsUQhttp://www.youtube.com/watch?v=FDg9keeiWSUhttp://www.cert.org/podcast/http://www.computing.co.uk/ctg/news/2168706/crash-podcast-cyber-security-concerns-sap-hana-4ghttp://youtu.be/RPXlu78kbUshttp://youtu.be/RPXlu78kbUshttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://youtu.be/RPXlu78kbUshttp://youtu.be/RPXlu78kbUshttp://www.computing.co.uk/ctg/news/2168706/crash-podcast-cyber-security-concerns-sap-hana-4ghttp://www.cert.org/podcast/http://www.youtube.com/watch?v=FDg9keeiWSUhttp://www.youtube.com/watch?v=5_epPdTLsUQhttp://internetadvisor.net/2012/06/internet-advisor-sat-june-9-2012-4-6pm-american-cyber-war-offensive/http://youtu.be/wIGF0kevTNEhttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://youtu.be/0f13hzKiihghttp://www.youtube.com/watch?v=0f13hzKiihg&list=UUmb3AN9RMv4NZslyIsdI-Bg&index=9&feature=plcphttp://www.cyberdefenceforum.com/Event.aspx?id=770984
  • 7/29/2019 Cyber Bibliography 2012

    8/13

    FASCINATING TIMELINES

    Page 7

    2012 Cyber Attacks Timeline Master Index

    Paolo Passeri (Paul Sparrows), Hackmageddon,June 2012

    Timeline of Anonymous and Affiliates Cyber Attacks

    Diane Bartz, Reuters, March 2012

    Privilege: A Timeline of Recent Cyber Attacks [Infographic]

    Cyber-Arc, 2012

    Cyber War: The Next Threat to National Security and What to Do About It

    Jeremy Norman, Updated 2012

    Stuxnet timeline

    Langner Communications,July Dec 2010

    Cyber Warfare in China timeline

    Ars Technica, 1999-2009

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://hackmageddon.com/2012-cyber-attacks-timeline-master-index/http://www.huffingtonpost.com/2012/03/06/timeline-anonymous-cyber-attacks_n_1325459.htmlhttp://pinterest.com/pin/260645897154485515/http://www.historyofinformation.com/index.php?category=Military+%2F+Warfare+%2F+Cyberwarfarehttp://www.langner.com/en/2010/12/09/our-stuxnet-timeline/http://static.arstechnica.com/1-12-2010/chinese_hack_timeline.jpghttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://static.arstechnica.com/1-12-2010/chinese_hack_timeline.jpghttp://www.langner.com/en/2010/12/09/our-stuxnet-timeline/http://www.historyofinformation.com/index.php?category=Military+%2F+Warfare+%2F+Cyberwarfarehttp://pinterest.com/pin/260645897154485515/http://www.huffingtonpost.com/2012/03/06/timeline-anonymous-cyber-attacks_n_1325459.htmlhttp://hackmageddon.com/2012-cyber-attacks-timeline-master-index/
  • 7/29/2019 Cyber Bibliography 2012

    9/13

    Page 8

    CYBER DEFENCE FORUM 2012

    View the full programme

    23 - 25 October 2012, Prague

    Join us at the Cyber Defence Forumand network with others in this critical field.

    This event will run as a series of panel discussions and round tables, ensuring you get the answers to your questions and have

    face to face time with experts and key decision-makers. This new and exciting format will also ensure that there is as increased

    opportunity for audience participation meaning that the opportunity to share knowledge is increased further still.

    Building on the great success of our last event in London, when over 150 senior officers, government officials and leading industry

    contractors from 21 nations gathered to discuss the latest cyber issues, the Cyber Defence Forum will focus specifically on the

    challenges, operations and solutions facing armed forces and governments as they formulate national strategies to keep theirdefensive and offensive cyber capabilities current and in-line with the international community.

    Key areas of focus for 2012 include:

    Building the Cyber Force. Learn how armed forces globally arelooking to bridge the human capabilities gap in cyber warfare

    and IA practitioner.

    Ensuring Proactive Defences. Explore how armed forces arelooking to shift their cyber defence from a reactive to proactive

    approach, defending in depth with enhanced threat

    intelligence gathering and risk analysis capabilities.

    Civil Military Cooperation. Understand how to achieve thesuccessful coordination and pragmatic management of cyber

    operations across the public - private / civilian military divide

    both nationally and internationally.

    Greater Legal Clarity & Rules of Engagement. Discuss the legalambiguity surrounding cyber warfare and the international

    efforts to establish rules of engagement for practitioners in

    future incidents.

    Information Integrity and Agility. Discover how the latesttechnological innovations will allow increased information

    availability and agility whilst ensuring that security remains a top

    priority.

    Predicting the Future Threat Environment. Identify how thelatest trends are projected and ensure that you are armed with

    the knowledge to continually improve your systems and keep

    abreast of the latest innovations.

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.cyberdefenceforum.com/redForms.aspx?id=770966&pdf_form=1http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/redForms.aspx?id=770966&pdf_form=1
  • 7/29/2019 Cyber Bibliography 2012

    10/13

    Page 9

    OUR MEDIA PARTNERS

    armada

    Website: www.armadainternational.com

    armada is one of the world's leading defence publications and serves the air, sea and land

    communities in 183 countries with technically-oriented, reference quality editorial coverage.

    armada's circulation is audited annually by WEMF, the Swiss member of IFABC (International

    Federation of Audit Bureaux for Circulation). The latest certificate, dated 12 December 2006,

    determines a circulation of 22 573 copies.

    armada is a magazine made by specialists for specialists, and is read by the top 15 decision-makers

    in more than 120 countries.

    Armed Forces International

    Website: www.armedforces-int.com

    Armed Forces International is a military information and suppliers directory delivering the latestdefence news and information to users around the world. The portal forms an invaluable business

    resource for industry professionals, providing complete supplier profiles searchable by their

    products and services. The features offered by Armed Forces International also include detailed

    events and exhibition listings, videos and image galleries, supplier article publications, the latest

    contracts and tenders along with job vacancies available within the industry.

    Asian Military Review

    Website: www.asianmilitaryreview.com

    Asian Military Review is ABC audited largest circulated defence magazine in Asia-Pacific. Published

    since 1993 its read by key decision makers in militaries with information, opinion & facts for

    tracking & understanding defence developments worldwide for equipment, training, organisation &

    doctrine issues critical to creation & sustainment of military forces.

    ASDNews.com Be the first to know

    Website:www.asdnews.com

    ASDNews brings the latest aerospace, defence and security news from government, industry and

    major news agencies around the world. Our service has over 60,000 active subscribers and 2 million

    article readers per year.

    ASDNews content is categorised in over 25 main news groups for example: Training & Simulation

    News, or Unmanned Systems News making recent and related articles easy to find.

    Subscribe to our free daily newsletter or weekly group newsletters on

    www.asdnews.com/subscription

    ContingencyToday

    Website:www.contingencytoday.com/subscription_free.phpContingencyToday.com is dedicated to the challenges and opportunities of Critical National

    Infrastructure protection. Its readership includes policy-makers, decision-influencers and middle

    management implementers engaged in emergency planning, disaster recovery and infrastructure

    protection including electronic attack and the sophisticated misuse of computer systems; physical

    attacks by terrorist organisations and other criminals; the effects of climate change; and other

    natural disasters, including pandemics, fire and flood. Register for FREE Subscription and

    Complimentary Newsletter: (UK only)

    www.contingencytoday.com/subscription_free.php

    (Outside UK) mailto:[email protected]

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.armadainternational.com/http://www.armedforces-int.com/http://www.asianmilitaryreview.com/http://www.asdnews.com/http://www.asdnews.com/subscriptionhttp://www.contingencytoday.com/subscription_free.phphttp://www.contingencytoday.com/subscription_free.phpmailto:[email protected]://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.contingencytoday.com/subscription_free.phphttp://www.asdnews.com/http://www.asianmilitaryreview.com/mailto:[email protected]://www.contingencytoday.com/subscription_free.phphttp://www.contingencytoday.com/subscription_free.phphttp://www.asdnews.com/subscriptionhttp://www.asdnews.com/http://www.asianmilitaryreview.com/http://www.armedforces-int.com/http://www.armadainternational.com/
  • 7/29/2019 Cyber Bibliography 2012

    11/13

    Page 10

    Defence And Security Of India

    Website: www.defencesecurityindia.com

    DEFENCE AND SECURITY OF INDIA is India's only publication on national security, strategic affairs &

    policy matters. The magazine focuses on national security issues through insightful & analytical

    writing by top experts on national strategy, defence & security, diplomacy, foreign policy, economics,

    energy security & nuclear deterrence with South Asian perspective.

    Defence Professionals

    Website:www.defpro.com

    Defpro.com | a new opportunity to experience defence business at its finest!

    defence.professionals would be delighted to assist you in improving your access to local as well as

    international markets.

    defpro.com is an online working community and intelligence resource for defence professionals,

    providing current news, trends, analyses, and related services. Our international readership and

    users, coming from all defence related fields of interest and technology, are a valuable audience.

    defpro.com provides you with a fresh and comprehensive approach to reach industry partners as

    well as political decision-makers.

    Global Security Finance

    Website: www.globalsecurityfinance.com

    Global Security Finance, the online daily business news and financial data service, is the leading

    independent source of information about the physical, cyber and identity security and defense

    sectors. Our news team delivers real-time business news and identifies the latest and most relevant

    regulatory and policy announcements, investment, M&A and new funds and fund closes. This news is

    supplemented with opinion-pieces based on in-depth interviews with senior-level executives,

    advisers, investors and policy-makers. Our premium suite of desktop and mobile services provides

    access to subscription-based business news, transaction data (VC/PE, M&A) and a global directory of

    professionals active in the sector. Global Security Finance also offers customized research and senior-

    level networking events including the Homeland Security Finance Forum and the Cyber Security

    Finance Forum.

    Hakin9

    Website:hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8

    Hakin9 is a monthly downloadable IT security magazine. It provides invaluable and comprehensive

    technical knowledge, which allows the reader to stay up to date with the latest IT security threats

    and technologies. What makes this magazine so successful is its community base of countless expert

    contributors. Hakin9 is a must read for any security professionals who wish to have a broad view of

    their environment threats and the desire to proactively defend it by knowing the secrets that are

    usually only shared between crackers. We publish 4 issues per month which gives 48 issues per year!

    Buy year subscription and you also gain access to full archive from 2005! Just visit:

    hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8

    InfoSec News

    Website:http://www.infosecnews.org/mailman/listinfo/isn

    InfoSec News is a privately run, medium traffic list that caters to the distribution of information

    security news articles. These articles come from such sources as newspapers, magazines and online

    resources.

    Subscribe to InfoSec News today and get a digest of the latest cyber security news direct to your

    desk: www.infosecnews.org/mailman/listinfo/isn

    CYBER DEFENCE FORUM MEDIA PARTNERS

    Cyber Defence Forum 201223-25 October, Praguewww.cyberdefenceforum.com

    http://www.defencesecurityindia.com/http://www.defpro.com/http://www.globalsecurityfinance.com/http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.infosecnews.org/mailman/listinfo/isnhttp://www.infosecnews.org/mailman/listinfo/isnhttp://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.infosecnews.org/mailman/listinfo/isnhttp://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.globalsecurityfinance.com/http://www.defpro.com/http://www.infosecnews.org/mailman/listinfo/isnhttp://www.infosecnews.org/mailman/listinfo/isnhttp://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://hakin9.org/?a_aid=pawelplocki&a_bid=8f6377e8http://www.globalsecurityfinance.com/http://www.defpro.com/http://www.defencesecurityindia.com/
  • 7/29/2019 Cyber Bibliography 2012

    12/13

    Page 11

    MoD Oracle

    Website:www.modoracle.com

    MoD Oracle is the leading independent military Internet portal in the UK. Crammed with up-to-the-

    minute military news, job opportunities and reunions, the site also has specialist areas such as

    resettlement, honours, welfare and finance, making it the default website for tens of thousands of

    UK military personnel, serving and retired. MoD Oracle is used extensively by suppliers of goods andservices to the UK military as a shop window to keep the military community up to date with what is

    available.

    Military Systems & Technology

    Website:www.militarysystems-tech.com

    Military Systems & Technology is an on-line resource for the International Defence & Aerospace

    Industry. It is a major platform for communication between buyers and sellers. It profiles the very

    latest systems & technology from Defence Companies around the Globe. We pride ourselves on the

    quality of service and welcome any enquiries.

    Phone, +44 (0) 1398 351606

    E-mail, [email protected]

    Cyber Defence Forum 201223-25 October, Prague, The Netherlandswww.cyberdefenceforum.com

    CYBER DEFENCE FORUM MEDIA PARTNERS

    http://www.modoracle.com/http://www.militarysystems-tech.com/mailto:[email protected]://www.cyberdefenceforum.com/http://www.militarysystems-tech.com/http://www.modoracle.com/http://www.cyberdefenceforum.com/mailto:[email protected]:[email protected]:[email protected]://www.militarysystems-tech.com/http://www.militarysystems-tech.com/http://www.militarysystems-tech.com/http://www.modoracle.com/
  • 7/29/2019 Cyber Bibliography 2012

    13/13

    ABOUT Defence IQ

    Defence IQ is an authoritative news source for high quality and exclusivecommentary and analysis on global defence and military-related topics.Sourcing interviews and insights directly from senior military and industryprofessionals on air defence, cyber warfare, armoured vehicles, navaldefence, land defence and many more topics, Defence IQ is a uniquemultimedia platform to discuss and learn about the latest developmentswithin the defence sector.

    So join over 60,000 defence professionals to access all the exclusive videointerviews, podcasts, articles and whitepapers that are available and updatedon a daily basis.

    Join today for free by signing up on our website:

    www.DefenceIQ.com

    Connect with us through social media too, just follow the links below:

    Twitter

    LinkedIn

    Google+

    Facebook

    Page 12

    Cyber Defence Forum 201223-25 October, Praguewww cyberdefenceforum com

    http://www.defenceiq.com/https://twitter.com/http://www.linkedin.com/groups/Defence-IQ-World-Defense-Community-1878638https://plus.google.com/u/0/115407664403790603972http://www.facebook.com/pages/Defence-IQ-Military-Community/100268723353859http://www.cyberdefenceforum.com/http://www.cyberdefenceforum.com/http://www.facebook.com/pages/Defence-IQ-Military-Community/100268723353859https://plus.google.com/u/0/115407664403790603972http://www.linkedin.com/groups/Defence-IQ-World-Defense-Community-1878638https://twitter.com/http://www.defenceiq.com/