by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : May 15, 2013
32 May 15, 2013 FCW.COM Bookshelf will be speci c offensive teams, so one wonders what the rules of engagement will be to govern these offensive cyber teams. The manual can t hurt." Although the military s cyber rules of engagement remain classi- ed for national security reasons, some transparency could help gauge where DOD stands on cyber con ict s most signi cant issues. Jason Healey, director of the Atlantic Council s Cyber State- craft Initiative, said that although Pentagon of cials have noted the need to respond quickly to cyber threats, fast reactions are not necessarily as important as some believe. "Seeing how much engage- ment in con icts can take weeks, months and years, I m personally cautious the [rules of engagement] will be built by people who have dealt with this tactically, saying, A strike could come at us from nowhere, and we have to respond quickly, " Healey said. "Which is absolutely true, but that can be true in all the other domains of warfare also. So I m concerned we could be focused on the techni- cal truths rather than the strategic truths, which say we have more time." As the United States and other countries struggle to de ne cyberattacks, of cials also must consider how to handle activities in cyberspace that do not neces- sarily constitute an attack but do have malicious intent, such as dis- ruptive actions or espionage, the panelists said. "One of the big challenges now is we ve drawn that line in the sand of what a cyberattack is and what might constitute armed con ict in cyber," Brown said. "That leaves unanswered most of the issues around what s happen- ing now outside the context of armed con ict. Most things we read about fall into this second category. It s not part of a con ict, it s not part of an ongoing war. These are things that aren t really addressed by laws of warfare because [they don t] fall under that de nition of warfare. But the main reason the manual is incred- ibly important is because it nally draws the line." ■ FISCAL UNCERTAINTY BLUNTS GROWTH IN RUGGED MOBILE PUSH POINTS THE WAY TO RUGGED FUTURE COTS IS CHANGING APPROACH TO RUGGED SOLUTIONS IS SOLID STATE THE FUTURE OF RUGGED STORAGE? RUGGED S VALUE PROPOSITION LAGS USER NEEDS topics TO LEARN MORE, VISIT: WWW.FCW.COM/2013RUGGEDIT ONLINE REPORT SPONSORED BY:
April 30, 2013
May 30, 2013