Mostrar el registro sencillo del ítem
La Ciberseguridad: análisis político y estratégico
dc.creator | Saavedra, Boris | |
dc.creator | Parraguez, Luisa | |
dc.date | 2018-09-30 | |
dc.date.accessioned | 2023-01-18T19:13:02Z | |
dc.date.available | 2023-01-18T19:13:02Z | |
dc.identifier | https://esdegrevistas.edu.co/index.php/refa/article/view/801 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14205/7003 | |
dc.format | application/pdf | |
dc.language | spa | |
dc.publisher | Escuela Superior de Guerra - Colombia | es-ES |
dc.relation | https://esdegrevistas.edu.co/index.php/refa/article/view/801/1059 | |
dc.relation | /*ref*/Campbell, R.J. (10 de junio del 2015). Cybersecurity Issues for the Bulk Power System. Washington DC Congressional Research Service. Obtenido de https://www.fas.org/sgp/crs/misc/R43989.pdf | |
dc.relation | /*ref*/Choucri, N. (2012). Cyberpolitics in International Relations. Nueva York: HarperCollins. https://doi.org/10.7551/mitpress/7736.001.0001 | |
dc.relation | /*ref*/Clark, A. y Eddy, R.P. (2017). Warnings Finding Cassandras to Stop Catastrophes. Nueva York: HarperCollins publishers. | |
dc.relation | /*ref*/Connell, M. y Vogler, S. (2017). Russia's Approach to Cyber Warfare. CNA Analysis and Solutions. Obtenido de https://www.realclear-defense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html | |
dc.relation | /*ref*/European Commission. (2017). Cybersecurity initiatives: working towards a more secure on- line environment. Obtenido de http://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf | |
dc.relation | /*ref*/European Commission. (2017). Building an Effective European Cyber Shield: Taking EU Cooperation to the Next Level. Obtenido de http://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en | |
dc.relation | /*ref*/Friedman, A. y Singer, P. W. (2014). Cyber- security and Cyberwar what everyone needs to know. Oxford: Oxford University Press. | |
dc.relation | /*ref*/Friedman, T. L. (2016). Thank You for Being Late: An optimist's Guide to Thriving in the Age of Acceleration. Nueva York: Farrar, Straus & Giroux. | |
dc.relation | /*ref*/Goodman, M. (2015). Future Crimes Everything is Connected Everyone is Vulnerable and What We Can Do about It. Nueva York, EE.UU: Doubleday. | |
dc.relation | /*ref*/Gordon, B. (2017). The EU Gets Serious About Cyber: The EU Cybersecurity Act and Other Elements of the Cyber Package. Obtenido de https://www.lexology.com/library/detail.aspx?g=c401bf00-99dd-4a11-8d63-9387f10374bd | |
dc.relation | /*ref*/KPMG. (2017). Overview of China's Cybersecurity Law. KPMG. Obtenido de https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf | |
dc.relation | /*ref*/Kramer, Franklin D., et al. (eds.). (2009) Cyberpower and National Security. Washington: National Defense University Press & Potomac Books, Inc. | |
dc.relation | /*ref*/Lindsay, J., et al. (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.001.0001 | |
dc.relation | /*ref*/Luo, J., et al. (2014). A software vulnerability rating approach based on the vulnerability database. Journal of Applied Mathematics. Obtenido de https://www.hindawi.com/journals/jam/2014/932397/abs/ https://doi.org/10.1155/2014/932397 | |
dc.relation | /*ref*/Meulen, van der, Nicole, et al. (2015). Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses, RAND Corporation, European Parliament. | |
dc.relation | /*ref*/NATO. (2017). Cyber defence. Acceso a https://www.nato.int/cps/en/natohq/topics_78170.htm. | |
dc.relation | /*ref*/Robles Carrillo, M. (2017). Gobernanza política versus gobernanza tecnológica del ciberespacio, Instituto Español de Estudios Estratégicos. Obtenido de http://www.ieee.es/Galerias/fichero/docs_opinion/2017/DIEEEO56-2017_Gobernanza_Margarita_Robles.pdf | |
dc.relation | /*ref*/Schmidt, E. y Cohen, J. (2013). The New Digital Age: Transforming Nations, Businesses and Our Lives. Nueva York: Vintage Company. | |
dc.relation | /*ref*/Schneier, B. (2015). Data and Goliath The Hidden Battles to Collect Your Data and Control Your World. Nueva York: W. W. Norton & Company, Inc. | |
dc.relation | /*ref*/Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Era. Nueva York: Public Affairs. | |
dc.relation | /*ref*/Shea, J. (2018). How is NATO Meeting the Challenge of Cyberspace? PRISM, 7(2), 19-29. | |
dc.relation | /*ref*/Simon, P. (2013). Too Big to Ignore: The Business Case of Big Data. Nueva Jersey: John Wiley & Sons, Inc. https://doi.org/10.1002/9781119204039 | |
dc.relation | /*ref*/Singer P.W. y Friedman, A. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press. https://doi.org/10.1093/wentk/9780199918096.001.0001 | |
dc.relation | /*ref*/United Nations Office for Disarmament Affairs. (2018). Developments in the field of information and telecommunications in the context of international security. Obtenido de https://www.un.org/disarmament/topics/informationsecurity/ | |
dc.relation | /*ref*/UNLP (2016). Minería de datos aplicada a datos masivos. Obtenido de http://sedici.unlp.edu.ar/handle/10915/52901 | |
dc.relation | /*ref*/U.S. Department of Defense. (2015). The Department of Defense Cyber Strategy. Obtenido de https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf | |
dc.relation | /*ref*/U.S. National Intelligence. (2018). Statement for the record: Worldwide Threat Assessment of the US Intelligence Community. Obtenido de https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF | |
dc.relation | /*ref*/Vaishnav, C., et al. (2013). "Cyber International Relations as an Integrated System." Environment Systems and Decisions, 33(4), 561- 576. https://doi.org/10.1007/s10669-013-9480-3 | |
dc.rights | https://creativecommons.org/licenses/by-nc-nd/4.0 | es-ES |
dc.source | Fuerzas Armadas; Núm. 244-245 (2018): Transformación de las Fuerzas Militares: clave para el futuro de la seguridad y defensa nacionales; 73-80 | es-ES |
dc.source | 0120-0631 | |
dc.title | La Ciberseguridad: análisis político y estratégico | es-ES |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Fuerzas Armadas [3718]