Excelsior University
National Cybersecurity Institute
To date, traditional diplomatic instruments and structures have only been marginally effective in combating cybersecurity risks. Perhaps it is time to use a model that has been effective in another challenging international arena, money... more
he discovery of the Stuxnet virus in 2010 pointed to nation-state involvement in cyber attacks at an unprecedented level and followed the Ghostnet penetrations of the Dali Lama s networks in 2009. Cybersecurity changed from a nuisance... more
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
En este artículo se sintetizan nuevos datos estratigráfícos y cronológicos obtenidos en el Poblado, sector sur-oriental de la ciudad de Médellín y Envigado, donde aflora una compleja y extensa secuencia de depósitos de vertiente. Basados... more
To help spur innovation in the acquisition of major defense systems and reduce their cost, time, and risks, the Department of Defense launched the Computational Research and Engineering Acquisition Tools and Environments (CREATE) program... more
Terrorismo en la corporación UNYSIS en los años 2006-2009. Estuvo a cargo del Planeamiento Estratégico en la oficina del Jefe de Operaciones Navales, en el Pentágono. Entre sus publicaciones se puede destacar: El reto de Ciberseguridad... more
Today, rapid product innovation is essential to remain competitive. To help spur innovation in the acquisition of major defense systems and reduce their cost, time and risks, the Department of Defense launched the Computational Research... more
To help spur innovation in the acquisition of major defense systems and reduce their cost, time, and risks, the Department of Defense launched the Computational Research and Engineering Acquisition Tools and Environments (CREATE) program... more
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
Terrorismo en la corporación UNYSIS en los años 2006-2009. Estuvo a cargo del Planeamiento Estratégico en la oficina del Jefe de Operaciones Navales, en el Pentágono. Entre sus publicaciones se puede destacar: El reto de Ciberseguridad... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more