Our website uses cookies. For some of them we need your consent. Edit consent...

MoD Library and Information System

Search the digital library catalog
  • (Pomoč)
  • A-
  • A+
  • English (UK)
  • Slovenščina

Query: search in
search in
search in
search in
Work type: * old and bolonia study programme
Language:
Search in:
Options:
  Reset


Search without a query returns a maximum of 100 hits!

1 - 10 / 100
First pagePrevious page12345678910Next pageLast page
1.
Trideset let 132. gorskega polka
2022

Keywords: gorske enote, vojaško gorništvo, Slovenija, zgodovinski vidik, zborniki
Published: 21.09.2022; Views: 99; Downloads: 16
.pdf Fulltext (8,57 MB)

2.
3.
Vojaški logist
2022

Published: 07.09.2022; Views: 171; Downloads: 48
.pdf Fulltext (6,16 MB)

4.
Modrost v jeseni
2022

Published: 22.07.2022; Views: 540; Downloads: 37
.pdf Fulltext (7,29 MB)

5.
Logistik
2022

Published: 19.07.2022; Views: 563; Downloads: 48
.pdf Fulltext (8,53 MB)

6.
Editorial
Jacob Galbreath, 2022

Keywords: armed forces, defence politics, cyberspace, cyber operations, security chalenges
Published: 11.07.2022; Views: 444; Downloads: 32
.pdf Fulltext (284,96 KB)
This document has many files! More...

7.
Russian aggression on Ukraine
Damjan Štrucl, 2022

Abstract: The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number of cyber operations to achieve its politically strategic goals. Despite such debates, the Russo-Ukrainian war represents a new turning point in the global security environment, as many non-state actors have become involved in the conflict and cyberspace has become a tool for implementing sanctions. Thus, the article aims to analyze the implementation of cyber operations of the Russian Federation as observed in the case of its military aggression against Ukraine and the potential global impact of cyberspace in armed conflict for the future.
Keywords: cyberspace, hybrid operations, information operations, cyber operations, cyber attacks, Russian Federation, Ukraine
Published: 08.07.2022; Views: 435; Downloads: 17
.pdf Fulltext (594,23 KB)

8.
Learning from experience
Ignacio Pizarro, 2022

Abstract: The implementation of the cyberspace domain and capabilities into multi-domain operations has been plagued with difficulties, many of which come from a misperception of the nature of this domain as a technical field, detached from the usual understanding of combat operations. This has made leaders wary of addressing this domain, which has caused a delay in the adaptation of our military thinking to this new environment. In the article, we seek to point out the shortcomings and possible reasons for this delayed approach, and highlight areas in which established military knowledge, existing doctrine and even ancient principles can be used to meet the challenge of bringing cyber capabilities to their full potential in military operations
Keywords: military operations, cyberspace, military, military doctrine
Published: 07.07.2022; Views: 409; Downloads: 10
.pdf Fulltext (391,55 KB)

9.
Leashing the dogs of cyber war
Tatiana Jančárková, 2022

Abstract: States have increasingly been engaged in the development of cyber capabilities which can act across the full spectrum of effects. The structures competent to deliver these effects are usually institutionally tied to armed forces or intelligence services, or represent a mixture of the two. Both types of organizations are typically subject to strict oversight and control mechanisms due to the nature of their activities and their potential to impact on the constitutional foundations of a democratic state. Yet, there is limited research available on the respective national frameworks governing offensive cyber capabilities, and similarly little information on the applicable control mechanisms. This article provides an overview of the areas of oversight, explores the challenges related to cyber capabilities, and offers possible avenues for future research.
Keywords: offensive cyber operations, human rights, rule of law, constitutional order, oversight
Published: 07.07.2022; Views: 437; Downloads: 13
.pdf Fulltext (359,45 KB)

10.
Planning for success
Christopher Young, 2022

Abstract: Training is an investment in tomorrow fueled by the needs and resources of today. It is time-consuming to build training correctly, but even more so to do it poorly. The model that NATO uses to create and evaluate its training programmes is based on accepted industry standards, but it is not necessarily being used to its full potential in the area of cyberspace. The efficacy of the model is predicated on the objective quality of the deliverables it produces, yet development initiatives are often rushed or under-supported. Current evaluative practices also do not sufficiently confirm the quality of the training produced. More careful and deliberate planning is required, not only to create valid cyber training solutions for the Alliance, but also to ensure that its cyber training achieves organizational goals.
Keywords: cyber training, efficacy, evaluation, ADDIE Model, Kirkpatrick Model
Published: 07.07.2022; Views: 427; Downloads: 6
.pdf Fulltext (385,22 KB)

Search done in 0 sec.
Top
www.mo.gov.si Colophon   | Cookie settings Top