Skip to main content
Confirm Action
Confirmation message
Alert
Alert message
Availability
Loading...
Details
Loading...
Add new Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your new Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your new Pick list. Maximum length is 4000 characters.
Update Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your Pick list. Maximum length is 4000 characters.
Select target Pick list
Target Pick list
Remove records from the original Pick list
The records will only be copied into the target Pick list if left unchecked.
External display
Loading...
Share
Menu
Home
Print Collection
Cyber Defence
Leadership
Learning Science
Management
Military Science & Technology
Military History
Military Medicine & Psychology
Military & Strategic Studies
Political Science & International Studies
I Would Like to
Find out about Library Facilities
Ask the Librarian
Provide Feedback
MINDEF/SAF Publications
Air Force News
Air Force Training Command
Army News
Defence Industry and Systems Office
FOCUS: RSAF Safety Magazine
Navy News
Pioneer
Pointer
Pointer Monographs & Supplements
Pointer Monthly Essays
Other SAF Publications
NLB eResources
Digital Resources
Singapore History
Membership
Library Membership
Rules & Regulations
Register Now
Log in
Log in using your library account
Log in with your library account
Username
Please reenter your Username (e.g. SL_XXXXXX)
Please enter your Username (e.g. SL_XXXXXX)
Password
Please enter your password.
Forgot your password?
Log in
Hidden form elements
Header quickfind search
Search Terms
Online Resources
SAFTI MI Resources
Hidden form elements
Advanced search
Home
Back to previous set
Search results
Item category 1: Thematic Display
Filter results
Loading...
Search results
Showing 1 - 10 of 30
Previous
page of search results
Next
page of search results
Options
Refine results
Reserve selections
Reserve all
Save selections
Save all
Filter results
Sort by
Date (earliest first)
Title
Date (latest first)
Date (earliest first)
Author by title
Series number
List view record 1: A study on six types of political warfare
List view anchor tag for record 1: A study on six types of political warfare
Select record
1
: A study on six types of political warfare
0
Like
0
Dislike
Remove A study on six types of political warfare from your active Pick list
Save A study on six types of political warfare to your active Pick list
Add tags
for A study on six types of political warfare
Add review
for A study on six types of political warfare
A study on six types of political warfare
1981
View availability
for A study on six types of political warfare
Place reservation
for A study on six types of political warfare
Copies:
1
List view record 2: Political warfare and psychological operations : rethinking the US approach
List view anchor tag for record 2: Political warfare and psychological operations : rethinking the US approach
Select record
2
: Political warfare and psychological operations : rethinking the US approach
0
Like
0
Dislike
Remove Political warfare and psychological operations : rethinking the US approach from your active Pick list
Save Political warfare and psychological operations : rethinking the US approach to your active Pick list
Add tags
for Political warfare and psychological operations : rethinking the US approach
Add review
for Political warfare and psychological operations : rethinking the US approach
Political warfare and psychological operations : rethinking the US approach
1989
View availability
for Political warfare and psychological operations : rethinking the US approach
Place reservation
for Political warfare and psychological operations : rethinking the US approach
Copies:
1
List view record 3: Psychological operations and political warfare in long-term strategic planning
List view anchor tag for record 3: Psychological operations and political warfare in long-term strategic planning
Select record
3
: Psychological operations and political warfare in long-term strategic planning
0
Like
0
Dislike
Remove Psychological operations and political warfare in long-term strategic planning from your active Pick list
Save Psychological operations and political warfare in long-term strategic planning to your active Pick list
Add tags
for Psychological operations and political warfare in long-term strategic planning
Add review
for Psychological operations and political warfare in long-term strategic planning
Psychological operations and political warfare in long-term strategic planning
1990
View availability
for Psychological operations and political warfare in long-term strategic planning
Place reservation
for Psychological operations and political warfare in long-term strategic planning
Copies:
1
List view record 4: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
List view anchor tag for record 4: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Select record
4
: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
0
Like
0
Dislike
Remove Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle from your active Pick list
Save Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle to your active Pick list
Add tags
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Add review
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Johnson, Richard Denis
1997
View availability
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Place reservation
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Copies:
1
List view record 5: Refocusing concepts of security : the convergence of military and non-military tasks
List view anchor tag for record 5: Refocusing concepts of security : the convergence of military and non-military tasks
Select record
5
: Refocusing concepts of security : the convergence of military and non-military tasks
0
Like
0
Dislike
Remove Refocusing concepts of security : the convergence of military and non-military tasks from your active Pick list
Save Refocusing concepts of security : the convergence of military and non-military tasks to your active Pick list
Add tags
for Refocusing concepts of security : the convergence of military and non-military tasks
Add review
for Refocusing concepts of security : the convergence of military and non-military tasks
Refocusing concepts of security : the convergence of military and non-military tasks
Wing, I. G. R.
2000
View availability
for Refocusing concepts of security : the convergence of military and non-military tasks
Place reservation
for Refocusing concepts of security : the convergence of military and non-military tasks
Copies:
2
List view record 6: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
List view anchor tag for record 6: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
6
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
¿́¿In recent decades, the US economy has increased its reliance on its service and high-technology sectors and has become increasingly dependent on computers, electronic data storage and integrated communications networks. The result is the development of a new critical infrastructure that is exc...
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 7: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
List view anchor tag for record 7: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
7
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
List view record 8: Chinese information warfare : a phantom menace or emerging threat?
List view anchor tag for record 8: Chinese information warfare : a phantom menace or emerging threat?
Select record
8
: Chinese information warfare : a phantom menace or emerging threat?
0
Like
0
Dislike
Remove Chinese information warfare : a phantom menace or emerging threat? from your active Pick list
Save Chinese information warfare : a phantom menace or emerging threat? to your active Pick list
Add tags
for Chinese information warfare : a phantom menace or emerging threat?
Add review
for Chinese information warfare : a phantom menace or emerging threat?
Chinese information warfare : a phantom menace or emerging threat?
Yoshihara, Toshi
2004
View availability
for Chinese information warfare : a phantom menace or emerging threat?
Place reservation
for Chinese information warfare : a phantom menace or emerging threat?
Copies:
1
List view record 9: Managerial guide for handling cyber-terrorism and information warfare
List view anchor tag for record 9: Managerial guide for handling cyber-terrorism and information warfare
Select record
9
: Managerial guide for handling cyber-terrorism and information warfare
0
Like
0
Dislike
Remove Managerial guide for handling cyber-terrorism and information warfare from your active Pick list
Save Managerial guide for handling cyber-terrorism and information warfare to your active Pick list
Add tags
for Managerial guide for handling cyber-terrorism and information warfare
Add review
for Managerial guide for handling cyber-terrorism and information warfare
Managerial guide for handling cyber-terrorism and information warfare
Janczewski, Lech, 1943-
2005
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher.
View availability
for Managerial guide for handling cyber-terrorism and information warfare
Place reservation
for Managerial guide for handling cyber-terrorism and information warfare
Copies:
1
List view record 10: Cyber terrorism : political and economic implications
List view anchor tag for record 10: Cyber terrorism : political and economic implications
Select record
10
: Cyber terrorism : political and economic implications
0
Like
0
Dislike
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.
View availability
for Cyber terrorism : political and economic implications
Place reservation
for Cyber terrorism : political and economic implications
Copies:
1
List view record 1: A study on six types of political warfare
Select record
1
: A study on six types of political warfare
Remove A study on six types of political warfare from your active Pick list
Save A study on six types of political warfare to your active Pick list
Add tags
for A study on six types of political warfare
Add review
for A study on six types of political warfare
0
Like
0
Dislike
A study on six types of political warfare
1981
Place reservation
for A study on six types of political warfare
View availability
for A study on six types of political warfare
Copies:
1
List view record 2: Political warfare and psychological operations : rethinking the US approach
Select record
2
: Political warfare and psychological operations : rethinking the US approach
Remove Political warfare and psychological operations : rethinking the US approach from your active Pick list
Save Political warfare and psychological operations : rethinking the US approach to your active Pick list
Add tags
for Political warfare and psychological operations : rethinking the US approach
Add review
for Political warfare and psychological operations : rethinking the US approach
0
Like
0
Dislike
Political warfare and psychological operations : rethinking the US approach
1989
Place reservation
for Political warfare and psychological operations : rethinking the US approach
View availability
for Political warfare and psychological operations : rethinking the US approach
Copies:
1
List view record 3: Psychological operations and political warfare in long-term strategic planning
Select record
3
: Psychological operations and political warfare in long-term strategic planning
Remove Psychological operations and political warfare in long-term strategic planning from your active Pick list
Save Psychological operations and political warfare in long-term strategic planning to your active Pick list
Add tags
for Psychological operations and political warfare in long-term strategic planning
Add review
for Psychological operations and political warfare in long-term strategic planning
0
Like
0
Dislike
Psychological operations and political warfare in long-term strategic planning
1990
Place reservation
for Psychological operations and political warfare in long-term strategic planning
View availability
for Psychological operations and political warfare in long-term strategic planning
Copies:
1
List view record 4: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Select record
4
: Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Remove Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle from your active Pick list
Save Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle to your active Pick list
Add tags
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Add review
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
0
Like
0
Dislike
Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Johnson, Richard Denis
1997
Place reservation
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
View availability
for Seeds of victory : psychological warfare and propaganda : the seeds of victory in modern political & military campaigns : the Persian Gulf War as a case study in operational principle
Copies:
1
List view record 5: Refocusing concepts of security : the convergence of military and non-military tasks
Select record
5
: Refocusing concepts of security : the convergence of military and non-military tasks
Remove Refocusing concepts of security : the convergence of military and non-military tasks from your active Pick list
Save Refocusing concepts of security : the convergence of military and non-military tasks to your active Pick list
Add tags
for Refocusing concepts of security : the convergence of military and non-military tasks
Add review
for Refocusing concepts of security : the convergence of military and non-military tasks
0
Like
0
Dislike
Refocusing concepts of security : the convergence of military and non-military tasks
Wing, I. G. R.
2000
Place reservation
for Refocusing concepts of security : the convergence of military and non-military tasks
View availability
for Refocusing concepts of security : the convergence of military and non-military tasks
Copies:
2
List view record 6: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Select record
6
: Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Remove Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland from your active Pick list
Save Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland to your active Pick list
Add tags
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Add review
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
0
Like
0
Dislike
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Cordesman, Anthony H.
2002
Place reservation
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
View availability
for Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland
Copies:
2
List view record 7: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Select record
7
: Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Remove Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages from your active Pick list
Save Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages to your active Pick list
Add tags
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Add review
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
0
Like
0
Dislike
Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Jones, Andy, 1952-
2002
Place reservation
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
View availability
for Global information warfare : how businesses, governments, and others achieve objectives and attain competitive advantages
Copies:
1
List view record 8: Chinese information warfare : a phantom menace or emerging threat?
Select record
8
: Chinese information warfare : a phantom menace or emerging threat?
Remove Chinese information warfare : a phantom menace or emerging threat? from your active Pick list
Save Chinese information warfare : a phantom menace or emerging threat? to your active Pick list
Add tags
for Chinese information warfare : a phantom menace or emerging threat?
Add review
for Chinese information warfare : a phantom menace or emerging threat?
0
Like
0
Dislike
Chinese information warfare : a phantom menace or emerging threat?
Yoshihara, Toshi
2004
Place reservation
for Chinese information warfare : a phantom menace or emerging threat?
View availability
for Chinese information warfare : a phantom menace or emerging threat?
Copies:
1
List view record 9: Managerial guide for handling cyber-terrorism and information warfare
Select record
9
: Managerial guide for handling cyber-terrorism and information warfare
Remove Managerial guide for handling cyber-terrorism and information warfare from your active Pick list
Save Managerial guide for handling cyber-terrorism and information warfare to your active Pick list
Add tags
for Managerial guide for handling cyber-terrorism and information warfare
Add review
for Managerial guide for handling cyber-terrorism and information warfare
0
Like
0
Dislike
Managerial guide for handling cyber-terrorism and information warfare
Janczewski, Lech, 1943-
2005
Place reservation
for Managerial guide for handling cyber-terrorism and information warfare
View availability
for Managerial guide for handling cyber-terrorism and information warfare
Copies:
1
List view record 10: Cyber terrorism : political and economic implications
Select record
10
: Cyber terrorism : political and economic implications
Remove Cyber terrorism : political and economic implications from your active Pick list
Save Cyber terrorism : political and economic implications to your active Pick list
Add tags
for Cyber terrorism : political and economic implications
Add review
for Cyber terrorism : political and economic implications
0
Like
0
Dislike
Cyber terrorism : political and economic implications
Colarik, Andrew M.
2006
Place reservation
for Cyber terrorism : political and economic implications
View availability
for Cyber terrorism : political and economic implications
Copies:
1
Hidden form elements
Clear current selections
items currently selected
View my active Pick list
0
Items in my active Pick list
Redirect message
×
You will be redirected if there is no further actions on this page