Skip to main content
Confirm Action
Confirmation message
Alert
Alert message
Availability
Loading...
Details
Loading...
Add new Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your new Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your new Pick list. Maximum length is 4000 characters.
Update Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your Pick list. Maximum length is 4000 characters.
Select target Pick list
Target Pick list
Remove records from the original Pick list
The records will only be copied into the target Pick list if left unchecked.
External display
Loading...
Share
Menu
Home
Print Collection
Cyber Defence
Leadership
Learning Science
Management
Military Science & Technology
Military History
Military Medicine & Psychology
Military & Strategic Studies
Political Science & International Studies
I Would Like to
Find out about Library Facilities
Ask the Librarian
Provide Feedback
MINDEF/SAF Publications
Air Force News
Air Force Training Command
Army News
Defence Industry and Systems Office
FOCUS: RSAF Safety Magazine
Navy News
Pioneer
Pointer
Pointer Monographs & Supplements
Pointer Monthly Essays
Other SAF Publications
NLB eResources
Digital Resources
Singapore History
Membership
Library Membership
Rules & Regulations
Register Now
Log in
Log in using your library account
Log in with your library account
Username
Please reenter your Username (e.g. SL_XXXXXX)
Please enter your Username (e.g. SL_XXXXXX)
Password
Please enter your password.
Forgot your password?
Log in
Hidden form elements
Header quickfind search
Search Terms
Online Resources
SAFTI MI Resources
Hidden form elements
Advanced search
Home
Back to previous set
Search results
Item category 1: Thematic Display
Filter results
Loading...
Search results
Showing 1 - 10 of 30
Previous
page of search results
Next
page of search results
Options
Refine results
Reserve selections
Reserve all
Save selections
Save all
Filter results
Sort by
Author by title
Title
Date (latest first)
Date (earliest first)
Author by title
Series number
List view record 1: An assessment of the Department of Defense strategy for operating in cyberspace
List view anchor tag for record 1: An assessment of the Department of Defense strategy for operating in cyberspace
Select record
1
: An assessment of the Department of Defense strategy for operating in cyberspace
0
Like
0
Dislike
Remove An assessment of the Department of Defense strategy for operating in cyberspace from your active Pick list
Save An assessment of the Department of Defense strategy for operating in cyberspace to your active Pick list
Add tags
for An assessment of the Department of Defense strategy for operating in cyberspace
Add review
for An assessment of the Department of Defense strategy for operating in cyberspace
An assessment of the Department of Defense strategy for operating in cyberspace
Chen, Thomas M.
2013
In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S. Govern...
View availability
for An assessment of the Department of Defense strategy for operating in cyberspace
Place reservation
for An assessment of the Department of Defense strategy for operating in cyberspace
Copies:
1
List view record 2: Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
List view anchor tag for record 2: Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Select record
2
: Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
0
Like
0
Dislike
Remove Tribal militias : an effective tool to counter Al-Qaida and its affiliates? from your active Pick list
Save Tribal militias : an effective tool to counter Al-Qaida and its affiliates? to your active Pick list
Add tags
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Add review
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Cigar, Norman L.
2014
"Despite over a decade of open war, dealing with Al-Qaida and its affiliates in the Middle East is likely to remain a concern for the foreseeable future and will pose a challenge requiring the use of any tool that is likely to be effective in meeting the threat. Developing effective tools to coun...
View availability
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Place reservation
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Copies:
1
List view record 3: Cyber war : the next threat to national security and what to do about it
List view anchor tag for record 3: Cyber war : the next threat to national security and what to do about it
Select record
3
: Cyber war : the next threat to national security and what to do about it
0
Like
0
Dislike
Remove Cyber war : the next threat to national security and what to do about it from your active Pick list
Save Cyber war : the next threat to national security and what to do about it to your active Pick list
Add tags
for Cyber war : the next threat to national security and what to do about it
Add review
for Cyber war : the next threat to national security and what to do about it
Cyber war : the next threat to national security and what to do about it
Clarke, Richard A. (Richard Alan), 1951-
2010
View availability
for Cyber war : the next threat to national security and what to do about it
Place reservation
for Cyber war : the next threat to national security and what to do about it
Copies:
1
List view record 4: Cyber terrorism : political and economic implications
List view anchor tag for record 4: Cyber terrorism : political and economic implications
Select record
4
: Cyber terrorism : political and economic implications
0
Like
0
Dislike
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.
View availability
for Cyber terrorism : political and economic implications
Place reservation
for Cyber terrorism : political and economic implications
Copies:
1
List view record 5: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
List view anchor tag for record 5: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
5
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
¿́¿In recent decades, the US economy has increased its reliance on its service and high-technology sectors and has become increasingly dependent on computers, electronic data storage and integrated communications networks. The result is the development of a new critical infrastructure that is exc...
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 6: Information warfare : separating hype from reality
List view anchor tag for record 6: Information warfare : separating hype from reality
Select record
6
: Information warfare : separating hype from reality
0
Like
0
Dislike
Remove Information warfare : separating hype from reality from your active Pick list
Save Information warfare : separating hype from reality to your active Pick list
Add tags
for Information warfare : separating hype from reality
Add review
for Information warfare : separating hype from reality
Information warfare : separating hype from reality
E. Leigh Armistead
2007
View availability
for Information warfare : separating hype from reality
Place reservation
for Information warfare : separating hype from reality
Copies:
1
List view record 7: Managerial guide for handling cyber-terrorism and information warfare
List view anchor tag for record 7: Managerial guide for handling cyber-terrorism and information warfare
Select record
7
: Managerial guide for handling cyber-terrorism and information warfare
0
Like
0
Dislike
Remove Managerial guide for handling cyber-terrorism and information warfare from your active Pick list
Save Managerial guide for handling cyber-terrorism and information warfare to your active Pick list
Add tags
for Managerial guide for handling cyber-terrorism and information warfare
Add review
for Managerial guide for handling cyber-terrorism and information warfare
Managerial guide for handling cyber-terrorism and information warfare
Janczewski, Lech, 1943-
2005
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher.
View availability
for Managerial guide for handling cyber-terrorism and information warfare
Place reservation
for Managerial guide for handling cyber-terrorism and information warfare
Copies:
1
List view record 8: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
List view anchor tag for record 8: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Select record
8
: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
0
Like
0
Dislike
Remove Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza from your active Pick list
Save Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza to your active Pick list
Add tags
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Add review
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Johnson, David E.
2010
View availability
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Access resource
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Copies:
1
List view record 9: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
List view anchor tag for record 9: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Select record
9
: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
0
Like
0
Dislike
Remove Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle from your active Pick list
Save Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle to your active Pick list
Add tags
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Add review
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Johnson, Richard Denis
1997
View availability
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Place reservation
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Copies:
1
List view record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
List view anchor tag for record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
10
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
List view record 1: An assessment of the Department of Defense strategy for operating in cyberspace
Select record
1
: An assessment of the Department of Defense strategy for operating in cyberspace
Remove An assessment of the Department of Defense strategy for operating in cyberspace from your active Pick list
Save An assessment of the Department of Defense strategy for operating in cyberspace to your active Pick list
Add tags
for An assessment of the Department of Defense strategy for operating in cyberspace
Add review
for An assessment of the Department of Defense strategy for operating in cyberspace
0
Like
0
Dislike
An assessment of the Department of Defense strategy for operating in cyberspace
Chen, Thomas M.
2013
Place reservation
for An assessment of the Department of Defense strategy for operating in cyberspace
View availability
for An assessment of the Department of Defense strategy for operating in cyberspace
Copies:
1
List view record 2: Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Select record
2
: Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Remove Tribal militias : an effective tool to counter Al-Qaida and its affiliates? from your active Pick list
Save Tribal militias : an effective tool to counter Al-Qaida and its affiliates? to your active Pick list
Add tags
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Add review
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
0
Like
0
Dislike
Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Cigar, Norman L.
2014
Place reservation
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
View availability
for Tribal militias : an effective tool to counter Al-Qaida and its affiliates?
Copies:
1
List view record 3: Cyber war : the next threat to national security and what to do about it
Select record
3
: Cyber war : the next threat to national security and what to do about it
Remove Cyber war : the next threat to national security and what to do about it from your active Pick list
Save Cyber war : the next threat to national security and what to do about it to your active Pick list
Add tags
for Cyber war : the next threat to national security and what to do about it
Add review
for Cyber war : the next threat to national security and what to do about it
0
Like
0
Dislike
Cyber war : the next threat to national security and what to do about it
Clarke, Richard A. (Richard Alan), 1951-
2010
Place reservation
for Cyber war : the next threat to national security and what to do about it
View availability
for Cyber war : the next threat to national security and what to do about it
Copies:
1
List view record 4: Cyber terrorism : political and economic implications
Select record
4
: Cyber terrorism : political and economic implications
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
0
Like
0
Dislike
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
Place reservation
for Cyber terrorism : political and economic implications
View availability
for Cyber terrorism : political and economic implications
Copies:
1
List view record 5: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
5
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 6: Information warfare : separating hype from reality
Select record
6
: Information warfare : separating hype from reality
Remove Information warfare : separating hype from reality from your active Pick list
Save Information warfare : separating hype from reality to your active Pick list
Add tags
for Information warfare : separating hype from reality
Add review
for Information warfare : separating hype from reality
0
Like
0
Dislike
Information warfare : separating hype from reality
E. Leigh Armistead
2007
Place reservation
for Information warfare : separating hype from reality
View availability
for Information warfare : separating hype from reality
Copies:
1
List view record 7: Managerial guide for handling cyber-terrorism and information warfare
Select record
7
: Managerial guide for handling cyber-terrorism and information warfare
Remove Managerial guide for handling cyber-terrorism and information warfare from your active Pick list
Save Managerial guide for handling cyber-terrorism and information warfare to your active Pick list
Add tags
for Managerial guide for handling cyber-terrorism and information warfare
Add review
for Managerial guide for handling cyber-terrorism and information warfare
0
Like
0
Dislike
Managerial guide for handling cyber-terrorism and information warfare
Janczewski, Lech, 1943-
2005
Place reservation
for Managerial guide for handling cyber-terrorism and information warfare
View availability
for Managerial guide for handling cyber-terrorism and information warfare
Copies:
1
List view record 8: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Select record
8
: Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Remove Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza from your active Pick list
Save Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza to your active Pick list
Add tags
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Add review
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
0
Like
0
Dislike
Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Johnson, David E.
2010
Access resource
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
View availability
for Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza
Copies:
1
List view record 9: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Select record
9
: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Remove Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle from your active Pick list
Save Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle to your active Pick list
Add tags
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Add review
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
0
Like
0
Dislike
Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Johnson, Richard Denis
1997
Place reservation
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
View availability
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Copies:
1
List view record 10: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
10
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
Hidden form elements
Clear current selections
items currently selected
View my active Pick list
0
Items in my active Pick list
Redirect message
×
You will be redirected if there is no further actions on this page