Thomas A., Jr. Johnson Johnson A. Johnson Thomas A., Jr. Johnson
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategies law enforcement officials can leverage against the perpetrators of cyber crimes. From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this...
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and ...
The tragedy of 9/11 placed homeland security and the prevention of further attacks into the central focus of our national consciousness. With so many avenues of terror open to our enemies in terms of mode, medium, and location, effective management and mitigation of threat must be grounded in objective risk assessment. The structure of national security decisions should be premised on decision theory and science with minimal political posturing or emotional reactivisim.
National Security Issues in Science, Law, and Technology demonstrates a mature look at a frightening subject and...
The tragedy of 9/11 placed homeland security and the prevention of further attacks into the central focus of our national consciousness. With so many ...
In order to eradicate terrorism, our nation must go beyond merely shoring up military strength. It must also effectively confront the fundamentalist ideology that fuels and supports the terrorists. The War on Terrorism: A Collision of Values, Strategies, and Societies operates on the premise that the violent rejection of globalization at the root of terrorism must be addressed not solely by Western society and its armies, but also by those moderate and progressive Muslims and their religious leaders who are capable of rebutting the medieval underpinnings of the jihadist...
In order to eradicate terrorism, our nation must go beyond merely shoring up military strength. It must also effectively confront the fundamentalis...
As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran s efforts to develop into a nuclear power in an area that lacks political stability, and the United States and China could soon find themselves in a global power tug-of-war.
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and...
As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China n...
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by...
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attac...