熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 37 筆, 頁數 1 / 1
呈現:
The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict
understanding among states, Libicki rethinks conflict thresholds and exit ramps that manage escalation. During the Cold War, there...... more |
|||
The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict
understanding among states, Libicki rethinks conflict thresholds and exit ramps that manage escalation. During the Cold War, there...... more |
|||
Internet Freedom and Political Space
The Internet is a new battleground between governments that censor online content and those who advo... more |
|||
An Assessment of the Assignments and Arrangements of the Executive Agent for DoD Biometrics and Status Report on the DoD Biometr
As the need to identify known and suspected combatants has elevated the importance of biometrics in ... more |
|||
Influences on the Adoption of Multifactor Authentication
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor a... more |
|||
What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative
|
|||
Cyberdeterrance and Cyberwar
Cyberwar is nothing so much as the manipulation of ambiguity. This title addresses such issues as th... more |
|||
How Terrorist Groups End: Lessons for Countering Al Qa’ida
All terrorist groups eventually end. But how? Most modern groups have ended because they joined the ... more |
|||
Byting Back: Regaining Information Superiority Against 21st-Century Insurgents
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because...... more |
|||
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, ’the virtual world created when they are connec... more |
|||
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, ’the virtual world created when they are connec... more |
|||
Exploring Terrorist Targeting Preferences
|
|||
Chinese Responses To U.s. Military Transformation And Implications For The Department Of Defense
The contributors to this text examine the constraints, facilitators, and potential options for Chine... more |
|||
The Costs and Benefits of Moving to the ICD-10 Code Sets
|
|||
New Challenges, New Tools for Defense Decisionmaking
Addresses the challenges for defense policy in a world transformed by the end of the Cold War and th... more |
|||
Cyberspace in Peace and War Second Edition
This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive...... more |
|||
Toward a Hot Jew
|
|||
Cyberspace in Peace and War
, signaling, and norms strategies. The result of over twenty years of analysis and assessment by author Martin C. Libicki, this...... more |
|||
Getting to Yes with China in Cyberspace
This study explores U.S. policy options for managing cyberspace relations with China via agreements ... more |
|||
A Framework for Programming and Budgeting for Cybersecurity
This report explains the menu of actions for defending an organization against cyberattack and recom... more |
|||
Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals
This report examines the portfolio of tools funded by the State Department s Bureau of Democracy, Hu... more |
|||
The Defender’s Dilemma: Charting a Course Toward Cybersecurity
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a m... more |
|||
Ramifications of Darpa’s Programming Computation on Encrypted Data Program
The primary purpose of the Programming Computation on Encrypted Data (PROCEED) program is to improve... more |
|||
Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This rep... more |
|||
Hackers Wanted: An Examination of the Cybersecurity Labor Market
The perceived shortage of cybersecurity professionals working on national security may endanger the ... more |
|||
Crisis and Escalation in Cyberspace
The chances are growing that the United States will find itself in a crisis in cyberspace--the escal... more |
|||
Root Cause Analyses of Nunn-McCurdy Breaches: Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program,
Congressional concern with cost overruns, or breaches of Nunn-McCurdy thresholds, in several major d... more |
|||
Global Demographic Change and Its Implications for Military Power
What is the impact of demographics on the prospective production of military power and the causes of... more |
|||
Cyberdeterrence and Cyberwar
quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more |
|||
Cyberdeterrence and Cyberwar
quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more |
|||
Cyberdeterrence and Cyberwar
quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more |
|||
Assessing Living Conditions in Iraq’s Anbar Province in 2009
In May-June 2009, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most... more |
|||
How Insurgencies End
RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies en... more |
|||
Living Conditions in Anbar Province in June 2008
In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most violent ... more |
|||
Underkill: Scalable Capabilities for Military Operations Amid Populations
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly forc... more |
|||
Scaffolding the New Web: Standards and Standards Policy for the Digital Economy
Although much of the growing digital economy rests on the Internet and World Wide Web, which in turn... more |
|||
The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon
|