The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,High School,College,University
| Teaching Since: | Apr 2017 |
| Last Sign in: | 359 Weeks Ago, 6 Days Ago |
| Questions Answered: | 6064 |
| Tutorials Posted: | 6070 |
Doctor of Education in Educational Leadership with a Specialization in Educational Technology
Phoniex University
Oct-1999 - Nov-2005
HR Executive
a21, Inc.
Nov-1998 - Dec-2005
Kramer, Franklin D., Stuart H. Starr, and Larry K. Wentz Eds. From Cyberspace to Cyberpower:Cyberpower and National Security, Dulles VA: Potomac Books Inc., 2009.
Brown, Gary and Keira Poellet. “The Customary International Law of Cyberspace,” Strategic Studies Quarterly 6:3 (2012):126-45. (Access via weekly reading folder under resources)
Denning, D. E. (2015). Rethinking the cyber domain and deterrence. Joint Forces Quarter. 2, 8-15. (Access via weekly reading folder under resources)
Department of Defense, The DOD Cyber Strategy, (Access via weekly reading folder under resources)
Dunlap Jr., Charles J. Maj Gen (Ret). “Perspectives for Cyber Strategists on Law for Cyber War.” Strategic Studies Quarterly, (2011): 81-99 (Access via weekly reading folder under resources)
Forsyth, James W. “What Great Powers Make of It: International Order and the Logic of Cooperation in Cyberspace.” Strategic Studies Quarterly 7:1 (2013) (
Hurwitz, Roger. “Depleted Trust in the Cyber Commons.” Strategic Studies Quarterly 6:3 (2012): 20-45
Iasiello, E. (2013). Is Cyber deterrence an illusory course of action. Journal of Strategic Security, 7(1), 54-67.
Kenney, M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1), 111-128.
Libicki, Martin C., Cyberdeterrence and Cyberwar, RAND Report, Santa Monica: Rand Corp., 2009,
Libicki, Martin C. “Cyberspace is Not a Warfighting Domain.” I/S A Journal of Law and Policy for the Information Society 8:2 (2012): 325-40,
Libicki, Martin C. “The Spectre of Non-Obvious Warfare.” Strategic Studies Quarterly 6:3 (2012): 88 - 101
Lin, Herbert. “Escalation Dynamics and Conflict Termination in Cyberspace.” Strategic Studies Quarterly 6:3 (2012): 46 -70
Mandiant, APT1: Exposing One of China’s Cyber Espionage Units, (2013)
Schmitt, Michael N. “International Law in Cyberspace: The Koh Speech and the Tallinn Manual Juxtaposed,” Harvard International Law Journal, 54 (2012)
Whitehouse, Cybersecurity Strategy and Implementation Plan (CSLIP) for the Federal Civilian Government. (October, 2015)
Whitehouse, National Security Strategy. (2015)
Sol-----------uti-----------ons----------- fi-----------le ----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I-----------