Mostrar el registro sencillo del ítem

dc.creatorSaavedra, Boris
dc.creatorParraguez, Luisa
dc.date2018-09-30
dc.date.accessioned2023-01-18T19:13:02Z
dc.date.available2023-01-18T19:13:02Z
dc.identifierhttps://esdegrevistas.edu.co/index.php/refa/article/view/801
dc.identifier.urihttps://hdl.handle.net/20.500.14205/7003
dc.formatapplication/pdf
dc.languagespa
dc.publisherEscuela Superior de Guerra - Colombiaes-ES
dc.relationhttps://esdegrevistas.edu.co/index.php/refa/article/view/801/1059
dc.relation/*ref*/Campbell, R.J. (10 de junio del 2015). Cybersecurity Issues for the Bulk Power System. Washington DC Congressional Research Service. Obtenido de https://www.fas.org/sgp/crs/misc/R43989.pdf
dc.relation/*ref*/Choucri, N. (2012). Cyberpolitics in International Relations. Nueva York: HarperCollins. https://doi.org/10.7551/mitpress/7736.001.0001
dc.relation/*ref*/Clark, A. y Eddy, R.P. (2017). Warnings Finding Cassandras to Stop Catastrophes. Nueva York: HarperCollins publishers.
dc.relation/*ref*/Connell, M. y Vogler, S. (2017). Russia's Approach to Cyber Warfare. CNA Analysis and Solutions. Obtenido de https://www.realclear-defense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html
dc.relation/*ref*/European Commission. (2017). Cybersecurity initiatives: working towards a more secure on- line environment. Obtenido de http://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf
dc.relation/*ref*/European Commission. (2017). Building an Effective European Cyber Shield: Taking EU Cooperation to the Next Level. Obtenido de http://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en
dc.relation/*ref*/Friedman, A. y Singer, P. W. (2014). Cyber- security and Cyberwar what everyone needs to know. Oxford: Oxford University Press.
dc.relation/*ref*/Friedman, T. L. (2016). Thank You for Being Late: An optimist's Guide to Thriving in the Age of Acceleration. Nueva York: Farrar, Straus & Giroux.
dc.relation/*ref*/Goodman, M. (2015). Future Crimes Everything is Connected Everyone is Vulnerable and What We Can Do about It. Nueva York, EE.UU: Doubleday.
dc.relation/*ref*/Gordon, B. (2017). The EU Gets Serious About Cyber: The EU Cybersecurity Act and Other Elements of the Cyber Package. Obtenido de https://www.lexology.com/library/detail.aspx?g=c401bf00-99dd-4a11-8d63-9387f10374bd
dc.relation/*ref*/KPMG. (2017). Overview of China's Cybersecurity Law. KPMG. Obtenido de https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf
dc.relation/*ref*/Kramer, Franklin D., et al. (eds.). (2009) Cyberpower and National Security. Washington: National Defense University Press & Potomac Books, Inc.
dc.relation/*ref*/Lindsay, J., et al. (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.001.0001
dc.relation/*ref*/Luo, J., et al. (2014). A software vulnerability rating approach based on the vulnerability database. Journal of Applied Mathematics. Obtenido de https://www.hindawi.com/journals/jam/2014/932397/abs/ https://doi.org/10.1155/2014/932397
dc.relation/*ref*/Meulen, van der, Nicole, et al. (2015). Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses, RAND Corporation, European Parliament.
dc.relation/*ref*/NATO. (2017). Cyber defence. Acceso a https://www.nato.int/cps/en/natohq/topics_78170.htm.
dc.relation/*ref*/Robles Carrillo, M. (2017). Gobernanza política versus gobernanza tecnológica del ciberespacio, Instituto Español de Estudios Estratégicos. Obtenido de http://www.ieee.es/Galerias/fichero/docs_opinion/2017/DIEEEO56-2017_Gobernanza_Margarita_Robles.pdf
dc.relation/*ref*/Schmidt, E. y Cohen, J. (2013). The New Digital Age: Transforming Nations, Businesses and Our Lives. Nueva York: Vintage Company.
dc.relation/*ref*/Schneier, B. (2015). Data and Goliath The Hidden Battles to Collect Your Data and Control Your World. Nueva York: W. W. Norton & Company, Inc.
dc.relation/*ref*/Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Era. Nueva York: Public Affairs.
dc.relation/*ref*/Shea, J. (2018). How is NATO Meeting the Challenge of Cyberspace? PRISM, 7(2), 19-29.
dc.relation/*ref*/Simon, P. (2013). Too Big to Ignore: The Business Case of Big Data. Nueva Jersey: John Wiley & Sons, Inc. https://doi.org/10.1002/9781119204039
dc.relation/*ref*/Singer P.W. y Friedman, A. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press. https://doi.org/10.1093/wentk/9780199918096.001.0001
dc.relation/*ref*/United Nations Office for Disarmament Affairs. (2018). Developments in the field of information and telecommunications in the context of international security. Obtenido de https://www.un.org/disarmament/topics/informationsecurity/
dc.relation/*ref*/UNLP (2016). Minería de datos aplicada a datos masivos. Obtenido de http://sedici.unlp.edu.ar/handle/10915/52901
dc.relation/*ref*/U.S. Department of Defense. (2015). The Department of Defense Cyber Strategy. Obtenido de https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
dc.relation/*ref*/U.S. National Intelligence. (2018). Statement for the record: Worldwide Threat Assessment of the US Intelligence Community. Obtenido de https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF
dc.relation/*ref*/Vaishnav, C., et al. (2013). "Cyber International Relations as an Integrated System." Environment Systems and Decisions, 33(4), 561- 576. https://doi.org/10.1007/s10669-013-9480-3
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/4.0es-ES
dc.sourceFuerzas Armadas; Núm. 244-245 (2018): Transformación de las Fuerzas Militares: clave para el futuro de la seguridad y defensa nacionales; 73-80es-ES
dc.source0120-0631
dc.titleLa Ciberseguridad: análisis político y estratégicoes-ES
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem