Search results
2 search for keyword(s)
'Network-centric operations (Military science)--Israel' ![Disable highlighting Disable highlighting](./images/text_horizontalrule.png)
![Print the current search page...](./images/print.gif)
![Sort available](./images/orderby_az.gif)
![]()
Books
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capabilit[...]
ISBN (or other code): 978-0-7704-3619-3 Article on page: 433 p. Descriptors: Class number: 363.325 900 4 Tags: Cyberspace operations (Military science)--United States ; Network-centric operations (Military science)--United States ; Network-centric operations (Military science)--Israel ; Computer crimes--Investigation--Iran--Case studies ; Uranium enrichment--Equipment and supplies ; Nuclear arms control--Iran ; United States--Armed Forces--Information technology Languages: English ![]()
Books
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capabilit[...]
ISBN (or other code): 978-0-7704-3617-9 Article on page: 433 p. Class number: 355.4 Tags: Network-centric operations (Military science)--United States ; Network-centric operations (Military science)--Israel ; Computer crimes--Investigation--Iran ; Nuclear arms control--Iran ; Nuclear nonproliferation--Iran ; United States--Foreign relations--Iran ; Iran--Foreign relations--United States Languages: English