熱門搜尋

    您輸入的關鍵字: Libicki

    分類(單選)
    配送方式(可複選)
    其他(可複選)
    ~

    搜尋結果共 37 筆, 頁數 1 / 1

    The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict

    The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict

    • 優惠價: 1328

    understanding among states, Libicki rethinks conflict thresholds and exit ramps that manage escalation. During the Cold War, there...... more

    The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict

    The New Calculus of Escalation: Avoiding Armageddon in Great Power Conflict

    • 優惠價: 6297

    understanding among states, Libicki rethinks conflict thresholds and exit ramps that manage escalation. During the Cold War, there...... more

    Internet Freedom and Political Space

    Internet Freedom and Political Space

    • 優惠價: 1977

    The Internet is a new battleground between governments that censor online content and those who advo... more

    An Assessment of the Assignments and Arrangements of the Executive Agent for DoD Biometrics and Status Report on the DoD Biometr

    An Assessment of the Assignments and Arrangements of the Executive Agent for DoD Biometrics and Status Report on the DoD Biometr

    • 優惠價: 1377

    As the need to identify known and suspected combatants has elevated the importance of biometrics in ... more

    Influences on the Adoption of Multifactor Authentication

    Influences on the Adoption of Multifactor Authentication

    • 優惠價: 1470

    Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor a... more

    What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative

    What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative

    • 優惠價: 1200
    Cyberdeterrance and Cyberwar

    Cyberdeterrance and Cyberwar

    • 優惠價: 1980

    Cyberwar is nothing so much as the manipulation of ambiguity. This title addresses such issues as th... more

    How Terrorist Groups End: Lessons for Countering Al Qa’ida

    How Terrorist Groups End: Lessons for Countering Al Qa’ida

    • 優惠價: 1980

    All terrorist groups eventually end. But how? Most modern groups have ended because they joined the ... more

    Byting Back: Regaining Information Superiority Against 21st-Century Insurgents

    Byting Back: Regaining Information Superiority Against 21st-Century Insurgents

    • 優惠價: 1380

    Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because...... more

    Conquest in Cyberspace: National Security and Information Warfare

    Conquest in Cyberspace: National Security and Information Warfare

    • 優惠價: 2580

    With billions of computers in existence, cyberspace, ’the virtual world created when they are connec... more

    Conquest in Cyberspace: National Security and Information Warfare

    Conquest in Cyberspace: National Security and Information Warfare

    • 優惠價: 4250

    With billions of computers in existence, cyberspace, ’the virtual world created when they are connec... more

    Exploring Terrorist Targeting Preferences

    Exploring Terrorist Targeting Preferences

    • 優惠價: 1200
    Chinese Responses To U.s. Military Transformation And Implications For The Department Of Defense

    Chinese Responses To U.s. Military Transformation And Implications For The Department Of Defense

    • 優惠價: 1200

    The contributors to this text examine the constraints, facilitators, and potential options for Chine... more

    The Costs and Benefits of Moving to the ICD-10 Code Sets

    The Costs and Benefits of Moving to the ICD-10 Code Sets

    • 優惠價: 1200
    New Challenges, New Tools for Defense Decisionmaking

    New Challenges, New Tools for Defense Decisionmaking

    • 優惠價: 1800

    Addresses the challenges for defense policy in a world transformed by the end of the Cold War and th... more

    Cyberspace in Peace and War Second Edition

    Cyberspace in Peace and War Second Edition

    • 優惠價: 3720

    This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive...... more

    Toward a Hot Jew

    Toward a Hot Jew

    • 優惠價: 950
    Cyberspace in Peace and War

    Cyberspace in Peace and War

    • 優惠價: 3300

    , signaling, and norms strategies. The result of over twenty years of analysis and assessment by author Martin C. Libicki, this...... more

    Getting to Yes with China in Cyberspace

    Getting to Yes with China in Cyberspace

    • 優惠價: 1170

    This study explores U.S. policy options for managing cyberspace relations with China via agreements ... more

    A Framework for Programming and Budgeting for Cybersecurity

    A Framework for Programming and Budgeting for Cybersecurity

    • 優惠價: 1350

    This report explains the menu of actions for defending an organization against cyberattack and recom... more

    Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

    Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

    • 優惠價: 900

    This report examines the portfolio of tools funded by the State Department s Bureau of Democracy, Hu... more

    The Defender’s Dilemma: Charting a Course Toward Cybersecurity

    The Defender’s Dilemma: Charting a Course Toward Cybersecurity

    • 優惠價: 1350

    Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a m... more

    Ramifications of Darpa’s Programming Computation on Encrypted Data Program

    Ramifications of Darpa’s Programming Computation on Encrypted Data Program

    • 優惠價: 1497

    The primary purpose of the Programming Computation on Encrypted Data (PROCEED) program is to improve... more

    Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

    Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

    • 優惠價: 1470

    Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This rep... more

    Hackers Wanted: An Examination of the Cybersecurity Labor Market

    Hackers Wanted: An Examination of the Cybersecurity Labor Market

    • 優惠價: 1377

    The perceived shortage of cybersecurity professionals working on national security may endanger the ... more

    Crisis and Escalation in Cyberspace

    Crisis and Escalation in Cyberspace

    • 優惠價: 1497

    The chances are growing that the United States will find itself in a crisis in cyberspace--the escal... more

    Root Cause Analyses of Nunn-McCurdy Breaches: Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program,

    Root Cause Analyses of Nunn-McCurdy Breaches: Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program,

    • 優惠價: 2157

    Congressional concern with cost overruns, or breaches of Nunn-McCurdy thresholds, in several major d... more

    Global Demographic Change and Its Implications for Military Power

    Global Demographic Change and Its Implications for Military Power

    • 優惠價: 1920

    What is the impact of demographics on the prospective production of military power and the causes of... more

    Cyberdeterrence and Cyberwar

    Cyberdeterrence and Cyberwar

    • 優惠價: 1138

    quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more

    Cyberdeterrence and Cyberwar

    Cyberdeterrence and Cyberwar

    • 優惠價: 2888

    quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more

    Cyberdeterrence and Cyberwar

    Cyberdeterrence and Cyberwar

    • 優惠價: 1138

    quickly. Cyberwar is nothing so much as the manipulation of ambiguity. Martin Libicki explores these topics in detail and uses...... more

    Assessing Living Conditions in Iraq’s Anbar Province in 2009

    Assessing Living Conditions in Iraq’s Anbar Province in 2009

    • 優惠價: 2880

    In May-June 2009, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most... more

    How Insurgencies End

    How Insurgencies End

    • 優惠價: 2460

    RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies en... more

    Living Conditions in Anbar Province in June 2008

    Living Conditions in Anbar Province in June 2008

    • 優惠價: 1560

    In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most violent ... more

    Underkill: Scalable Capabilities for Military Operations Amid Populations

    Underkill: Scalable Capabilities for Military Operations Amid Populations

    • 優惠價: 2160

    The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly forc... more

    Scaffolding the New Web: Standards and Standards Policy for the Digital Economy

    Scaffolding the New Web: Standards and Standards Policy for the Digital Economy

    • 優惠價: 1200

    Although much of the growing digital economy rests on the Internet and World Wide Web, which in turn... more

    The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon

    The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon

    • 優惠價: 190

    搜尋推薦

    另外從您輸入的關鍵字中,推薦您關鍵字: lick 的結果(請點選看全部符合的商品)

    您可能感興趣的活動

    • OPEN POINT 點數變現金 | 1點=1元,消費100%抵用無上限