wyszukanych pozycji: 14
Cyberdeterrence and Cyberwar
ISBN: 9780833047342 / Angielski / Miękka / 2009 / 214 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Cyberwar is nothing so much as the manipulation of ambiguity. This title addresses such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions governments can take to protect themselves in the face of deliberate cyberattack.
Cyberwar is nothing so much as the manipulation of ambiguity. This title addresses such issues as the pros and cons of counterattack, the value of det...
|
|
cena:
180,32 zł |
What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative
ISBN: 9780833050014 / Angielski / Miękka / 2011 / 110 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The Global Force Management Data Initiative was launched to improve aggregation of unclassified force-structure data. Aggregation, though, raised concerns about classification because the system might be attractive to a potential adversary. The authors develop a framework for evaluating classification decisions to determine that, while overall classification is not indicated, the inclusion of some data will require careful consideration.
The Global Force Management Data Initiative was launched to improve aggregation of unclassified force-structure data. Aggregation, though, raised conc...
|
|
cena:
115,35 zł |
Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: Rand Counterinsurgency Study
ISBN: 9780833041890 / Angielski / Miękka / 2007 / 159 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts coun...
|
|
cena:
125,67 zł |
Illuminating Tomorrow's War
ISBN: 9781478214526 / Angielski / Miękka / 2012 / 142 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) In the weeks leading up to Desert Storm, anxious analysts tried to forecast the course of the war by counting what the coalition and Iraq each brought to the battlefield: they have this many men, we have that many men; they have this much armor, we have that much armor; their air fleet is this big; ours is that big. Few doubted which side would prevail in battle, but many analysts were not so sure the war could be won swiftly and with acceptable casualties.
In the weeks leading up to Desert Storm, anxious analysts tried to forecast the course of the war by counting what the coalition and Iraq each brought...
|
|
cena:
91,02 zł |
The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict
ISBN: 9781647125769 / Angielski / 02-05-2025 Książka dostępna od: 02-05-2025 |
|
Planowany termin premiery książki: 02-05-2025
Książkę można już zamówić z rabatem 5% |
|
145,52 zł |
Conquest in Cyberspace: National Security and Information Warfare
ISBN: 9780521692144 / Angielski / Miękka / 2007 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...
|
|
cena:
158,88 zł |
Conquest in Cyberspace: National Security and Information Warfare
ISBN: 9780521871600 / Angielski / Twarda / 2007 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...
|
|
cena:
272,17 zł |
What Makes Industries Strategic: A Perspective on Technology, Economic Development, and Defense
ISBN: 9781478296737 / Angielski / Miękka / 2012 / 94 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The Secretary of the Treasury has applied his attention to the subject of manufactures; and particularly to the means of promoting such as will tend to render the United States independent on foreign nations for military and essential supplies.
The Secretary of the Treasury has applied his attention to the subject of manufactures; and particularly to the means of promoting such as will tend t...
|
|
cena:
81,91 zł |
Defending Cyberspace and Other Metaphors
ISBN: 9781410203205 / Angielski / Miękka / 2002 / 120 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow commerce into cyberspace, pitting foes against one another for control of this clearly critical high ground. But does this facile comparison have a basis in reality? In this iconoclastic spirit, the six essays in this book are characterized by a continuing search for the meaning of information warfare.
Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow com...
|
|
cena:
109,28 zł |
Exploring Terrorist Targeting Preferences
ISBN: 9780833039132 / Angielski / Miękka / 2006 / 107 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis.
Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book ...
|
|
cena:
109,28 zł |
Influences on the Adoption of Multifactor Authentication
ISBN: 9780833052353 / Angielski / Miękka / 2011 / 45 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint) is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA and where they choose to use it.
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) which combines something you k...
|
|
cena:
133,86 zł |
New Challenges, New Tools for Defense Decisionmaking
ISBN: 9780833032898 / Angielski / Miękka / 2003 / 416 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Addresses the challenges for defense policy in a world transformed by the end of the Cold War and then the war on terrorism, and sketches analytic techniques for framing particular defense issues.
Addresses the challenges for defense policy in a world transformed by the end of the Cold War and then the war on terrorism, and sketches analytic tec...
|
|
cena:
163,92 zł |
Dominant Battlespace Knowledge
ISBN: 9781410204134 / Angielski / Miękka / 2002 / 144 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
87,37 zł |
Internet Freedom and Political Space
ISBN: 9780833080639 / Angielski / Miękka / 2013 / 286 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
190,04 zł |