war
-
Exploitation of Network Centric Warfare Domains in Kenyan Politics – Reprint
(By Mwangi wa Ngugi, 2008 – Classic Reprint) AbstractThe study of Network Centric Warfare and Network Centric Operations enables the understanding of how warfare missions are accomplished, organised, and interrelated. This study has revealed the outcomes of the exploitation of Network Centric Warfare and Network Centric Operations attributes. These attributes are Information, Physical, Cognitive and… Continue reading
About Me
Peter Mwangi Ngugi – Bsc.Computer Science, Master Computer Security, CEH,MCITP,ACE
Specialization in Computer Security, Digital Forensics and Physical Security. Expert in a wide variety of
Computer Security, Digital Forensics, and Physical Security equipment and tools, both in the corporate industry and academia. Motivated to
provide tight security solutions and forensic investigations during these perilous times of cybercrime, fraudsters, unethical intruders, and
terrorism.
Recent Posts
- Exploitation of Network Centric Warfare Domains in Kenyan Politics – Reprint
- ‘Mulika Mwizi’ Phones: The Admissibility Challenge for 2G Evidence in Courts.
- Sample-Template for Information Security and Risk Management Awareness Training Program for your Organization
- From the archives: Phishing 06′
- Opinion: The Admissibility of Digital Evidence from Older, Active Handsets
Newsletter
google.com, pub-9127196933927426,DIRECT,f08c47fec0942fa0