Skip to main content
Confirm Action
Confirmation message
Alert
Alert message
Availability
Loading...
Details
Loading...
Add new Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your new Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your new Pick list. Maximum length is 4000 characters.
Update Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your Pick list. Maximum length is 4000 characters.
Select target Pick list
Target Pick list
Remove records from the original Pick list
The records will only be copied into the target Pick list if left unchecked.
External display
Loading...
Share
Menu
Home
Print Collection
Cyber Defence
Leadership
Learning Science
Management
Military Science & Technology
Military History
Military Medicine & Psychology
Military & Strategic Studies
Political Science & International Studies
I Would Like to
Find out about Library Facilities
Ask the Librarian
Provide Feedback
MINDEF/SAF Publications
Air Force News
Air Force Training Command
Army News
Defence Industry and Systems Office
FOCUS: RSAF Safety Magazine
Navy News
Pioneer
Pointer
Pointer Monographs & Supplements
Pointer Monthly Essays
Other SAF Publications
NLB eResources
Digital Resources
Singapore History
Membership
Library Membership
Rules & Regulations
Register Now
Log in
Log in using your library account
Log in with your library account
Username
Please reenter your Username (e.g. SL_XXXXXX)
Please enter your Username (e.g. SL_XXXXXX)
Password
Please enter your password.
Forgot your password?
Log in
Hidden form elements
Header quickfind search
Search Terms
Online Resources
SAFTI MI Resources
Hidden form elements
Advanced search
Home
Back to previous set
Search results
Item category 1: Thematic Display
Filter results
Loading...
Search results
Showing 1 - 10 of 30
Previous
page of search results
Next
page of search results
Options
Refine results
Reserve selections
Reserve all
Save selections
Save all
Filter results
Sort by
Title
Title
Date (latest first)
Date (earliest first)
Author by title
Series number
List view record 1: An assessment of the Department of Defense strategy for operating in cyberspace
List view anchor tag for record 1: An assessment of the Department of Defense strategy for operating in cyberspace
Select record
1
: An assessment of the Department of Defense strategy for operating in cyberspace
0
Like
0
Dislike
Remove An assessment of the Department of Defense strategy for operating in cyberspace from your active Pick list
Save An assessment of the Department of Defense strategy for operating in cyberspace to your active Pick list
Add tags
for An assessment of the Department of Defense strategy for operating in cyberspace
Add review
for An assessment of the Department of Defense strategy for operating in cyberspace
An assessment of the Department of Defense strategy for operating in cyberspace
Chen, Thomas M.
2013
In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S. Govern...
View availability
for An assessment of the Department of Defense strategy for operating in cyberspace
Place reservation
for An assessment of the Department of Defense strategy for operating in cyberspace
Copies:
1
List view record 2: The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
List view anchor tag for record 2: The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Select record
2
: The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
0
Like
0
Dislike
Remove The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests from your active Pick list
Save The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests to your active Pick list
Add tags
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Add review
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Poindexter, Dennis F.
2013
This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States"--Provided by publisher
View availability
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Place reservation
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Copies:
1
List view record 3: Chinese information warfare : a phantom menace or emerging threat?
List view anchor tag for record 3: Chinese information warfare : a phantom menace or emerging threat?
Select record
3
: Chinese information warfare : a phantom menace or emerging threat?
0
Like
0
Dislike
Remove Chinese information warfare : a phantom menace or emerging threat? from your active Pick list
Save Chinese information warfare : a phantom menace or emerging threat? to your active Pick list
Add tags
for Chinese information warfare : a phantom menace or emerging threat?
Add review
for Chinese information warfare : a phantom menace or emerging threat?
Chinese information warfare : a phantom menace or emerging threat?
Yoshihara, Toshi
2004
View availability
for Chinese information warfare : a phantom menace or emerging threat?
Place reservation
for Chinese information warfare : a phantom menace or emerging threat?
Copies:
1
List view record 4: The Chinese People's Liberation Army and information warfare
List view anchor tag for record 4: The Chinese People's Liberation Army and information warfare
Select record
4
: The Chinese People's Liberation Army and information warfare
0
Like
0
Dislike
Remove The Chinese People's Liberation Army and information warfare from your active Pick list
Save The Chinese People's Liberation Army and information warfare to your active Pick list
Add tags
for The Chinese People's Liberation Army and information warfare
Add review
for The Chinese People's Liberation Army and information warfare
The Chinese People's Liberation Army and information warfare
Wortzel, Larry M.
2014
On November 23, 2013, the Chinese government announced plans to establish a new air defense intercept zone which will include the Diaoyu or Senkaku Islands, sovereignty over which is disputed by Japan, China, and Taiwan. Due to complaints of cyber penetrations attributed to the Chinese People's L...
View availability
for The Chinese People's Liberation Army and information warfare
Place reservation
for The Chinese People's Liberation Army and information warfare
Copies:
1
List view record 5: Conquest in cyberspace : national security and information warfare
List view anchor tag for record 5: Conquest in cyberspace : national security and information warfare
Select record
5
: Conquest in cyberspace : national security and information warfare
0
Like
0
Dislike
Remove Conquest in cyberspace : national security and information warfare from your active Pick list
Save Conquest in cyberspace : national security and information warfare to your active Pick list
Add tags
for Conquest in cyberspace : national security and information warfare
Add review
for Conquest in cyberspace : national security and information warfare
Conquest in cyberspace : national security and information warfare
Libicki, Martin C.
2007
View availability
for Conquest in cyberspace : national security and information warfare
Place reservation
for Conquest in cyberspace : national security and information warfare
Copies:
1
List view record 6: Cyber terrorism : political and economic implications
List view anchor tag for record 6: Cyber terrorism : political and economic implications
Select record
6
: Cyber terrorism : political and economic implications
0
Like
0
Dislike
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.
View availability
for Cyber terrorism : political and economic implications
Place reservation
for Cyber terrorism : political and economic implications
Copies:
1
List view record 7: Cyber war : the next threat to national security and what to do about it
List view anchor tag for record 7: Cyber war : the next threat to national security and what to do about it
Select record
7
: Cyber war : the next threat to national security and what to do about it
0
Like
0
Dislike
Remove Cyber war : the next threat to national security and what to do about it from your active Pick list
Save Cyber war : the next threat to national security and what to do about it to your active Pick list
Add tags
for Cyber war : the next threat to national security and what to do about it
Add review
for Cyber war : the next threat to national security and what to do about it
Cyber war : the next threat to national security and what to do about it
Clarke, Richard A. (Richard Alan), 1951-
2010
View availability
for Cyber war : the next threat to national security and what to do about it
Place reservation
for Cyber war : the next threat to national security and what to do about it
Copies:
1
List view record 8: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
List view anchor tag for record 8: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
8
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
¿́¿In recent decades, the US economy has increased its reliance on its service and high-technology sectors and has become increasingly dependent on computers, electronic data storage and integrated communications networks. The result is the development of a new critical infrastructure that is exc...
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 9: Cyber-war : the anatomy of the global security threat
List view anchor tag for record 9: Cyber-war : the anatomy of the global security threat
Select record
9
: Cyber-war : the anatomy of the global security threat
0
Like
0
Dislike
Remove Cyber-war : the anatomy of the global security threat from your active Pick list
Save Cyber-war : the anatomy of the global security threat to your active Pick list
Add tags
for Cyber-war : the anatomy of the global security threat
Add review
for Cyber-war : the anatomy of the global security threat
Cyber-war : the anatomy of the global security threat
Richards, Julian (Julian James)
2014
View availability
for Cyber-war : the anatomy of the global security threat
Place reservation
for Cyber-war : the anatomy of the global security threat
Copies:
1
List view record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
List view anchor tag for record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
10
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
List view record 1: An assessment of the Department of Defense strategy for operating in cyberspace
Select record
1
: An assessment of the Department of Defense strategy for operating in cyberspace
Remove An assessment of the Department of Defense strategy for operating in cyberspace from your active Pick list
Save An assessment of the Department of Defense strategy for operating in cyberspace to your active Pick list
Add tags
for An assessment of the Department of Defense strategy for operating in cyberspace
Add review
for An assessment of the Department of Defense strategy for operating in cyberspace
0
Like
0
Dislike
An assessment of the Department of Defense strategy for operating in cyberspace
Chen, Thomas M.
2013
Place reservation
for An assessment of the Department of Defense strategy for operating in cyberspace
View availability
for An assessment of the Department of Defense strategy for operating in cyberspace
Copies:
1
List view record 2: The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Select record
2
: The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Remove The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests from your active Pick list
Save The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests to your active Pick list
Add tags
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Add review
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
0
Like
0
Dislike
The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Poindexter, Dennis F.
2013
Place reservation
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
View availability
for The Chinese information war : espionage, cyberwar, communications control and related threats to United States interests
Copies:
1
List view record 3: Chinese information warfare : a phantom menace or emerging threat?
Select record
3
: Chinese information warfare : a phantom menace or emerging threat?
Remove Chinese information warfare : a phantom menace or emerging threat? from your active Pick list
Save Chinese information warfare : a phantom menace or emerging threat? to your active Pick list
Add tags
for Chinese information warfare : a phantom menace or emerging threat?
Add review
for Chinese information warfare : a phantom menace or emerging threat?
0
Like
0
Dislike
Chinese information warfare : a phantom menace or emerging threat?
Yoshihara, Toshi
2004
Place reservation
for Chinese information warfare : a phantom menace or emerging threat?
View availability
for Chinese information warfare : a phantom menace or emerging threat?
Copies:
1
List view record 4: The Chinese People's Liberation Army and information warfare
Select record
4
: The Chinese People's Liberation Army and information warfare
Remove The Chinese People's Liberation Army and information warfare from your active Pick list
Save The Chinese People's Liberation Army and information warfare to your active Pick list
Add tags
for The Chinese People's Liberation Army and information warfare
Add review
for The Chinese People's Liberation Army and information warfare
0
Like
0
Dislike
The Chinese People's Liberation Army and information warfare
Wortzel, Larry M.
2014
Place reservation
for The Chinese People's Liberation Army and information warfare
View availability
for The Chinese People's Liberation Army and information warfare
Copies:
1
List view record 5: Conquest in cyberspace : national security and information warfare
Select record
5
: Conquest in cyberspace : national security and information warfare
Remove Conquest in cyberspace : national security and information warfare from your active Pick list
Save Conquest in cyberspace : national security and information warfare to your active Pick list
Add tags
for Conquest in cyberspace : national security and information warfare
Add review
for Conquest in cyberspace : national security and information warfare
0
Like
0
Dislike
Conquest in cyberspace : national security and information warfare
Libicki, Martin C.
2007
Place reservation
for Conquest in cyberspace : national security and information warfare
View availability
for Conquest in cyberspace : national security and information warfare
Copies:
1
List view record 6: Cyber terrorism : political and economic implications
Select record
6
: Cyber terrorism : political and economic implications
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
0
Like
0
Dislike
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
Place reservation
for Cyber terrorism : political and economic implications
View availability
for Cyber terrorism : political and economic implications
Copies:
1
List view record 7: Cyber war : the next threat to national security and what to do about it
Select record
7
: Cyber war : the next threat to national security and what to do about it
Remove Cyber war : the next threat to national security and what to do about it from your active Pick list
Save Cyber war : the next threat to national security and what to do about it to your active Pick list
Add tags
for Cyber war : the next threat to national security and what to do about it
Add review
for Cyber war : the next threat to national security and what to do about it
0
Like
0
Dislike
Cyber war : the next threat to national security and what to do about it
Clarke, Richard A. (Richard Alan), 1951-
2010
Place reservation
for Cyber war : the next threat to national security and what to do about it
View availability
for Cyber war : the next threat to national security and what to do about it
Copies:
1
List view record 8: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
8
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 9: Cyber-war : the anatomy of the global security threat
Select record
9
: Cyber-war : the anatomy of the global security threat
Remove Cyber-war : the anatomy of the global security threat from your active Pick list
Save Cyber-war : the anatomy of the global security threat to your active Pick list
Add tags
for Cyber-war : the anatomy of the global security threat
Add review
for Cyber-war : the anatomy of the global security threat
0
Like
0
Dislike
Cyber-war : the anatomy of the global security threat
Richards, Julian (Julian James)
2014
Place reservation
for Cyber-war : the anatomy of the global security threat
View availability
for Cyber-war : the anatomy of the global security threat
Copies:
1
List view record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
10
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
Hidden form elements
Clear current selections
items currently selected
View my active Pick list
11
Items in my active Pick list
Redirect message
×
You will be redirected if there is no further actions on this page