Uneingeschränkter Zugang

Missions and Actions Specific to Cyberspace Operations


Zitieren

[1] D. Roman, F. Repez, E.V. Popa, Infrastructura critică – Reglementări legislative și de planificare a protecției, Editura CTEA, București, pp. 93, 2017.Search in Google Scholar

[2] The Talinn Manual, On the International Law Applicable to Cyber Operations, 2nd edition, Cambridge University Press, pp. 111-122,2017.Search in Google Scholar

[3] Joint Publication 3-12, Cyberspace Operations, U.S.Army, pp. I-3, 2018.Search in Google Scholar

[4] JFODS 5: The Joint Forces Operations & Doctrine SMARTbook, 5th edition, The Lightning Press, pp. 6-8, 2017.Search in Google Scholar

[5] The U.S. Army War College, Strategic Cyberspace Operations Guide, 2018, available on https://csl.armywarcollege.edu/USACSL/Publications/Strategic_Cyberspace_Operations_Guide.pdf.Search in Google Scholar

[6] Joint Publication 3-12, Cyberspace Operations, U.S.Army, pp. II-5, 2018.Search in Google Scholar