Doprava zdarma se Zásilkovnou nad 1 499 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 GLS 54 Kurýr GLS 74 Zásilkovna 49 PPL 99

Terrorist Use of the Internet and Related Information Technologies

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Terrorist Use of the Internet and Related Information Technologies Patrick S Tibbetts
Libristo kód: 08243624
Nakladatelství Biblioscholar, listopadu 2012
Research Question: how will U.S. national security policy be affected by terrorist exploitation of t... Celý popis
? points 150 b
1 502 včetně DPH
Skladem u dodavatele Odesíláme za 15-20 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


Tonya D's Recipe Book Tonya D Simmons / Pevná
common.buy 873
Legends of the Jews - Volume 2 Louis Ginzberg / Brožovaná
common.buy 542
Versuchstierkunde Jürgen Weiss / Brožovaná
common.buy 2 798

Research Question: how will U.S. national security policy be affected by terrorist exploitation of the Internet and related information technologies? Information operations are nothing new; they have been used in military operations throughout the history of conflict. Arguably, however, the combination of breakneck speed of technological advances in information management systems and evolving threats to U.S. national security are redefining forever the nature of warfare. Some proponents have seen the great promise of information operations as the capability to mitigate, if not eliminate, the fog and friction of war by "seeing all." Consequently, current information operations doctrine seems to be focused squarely on the advantages of using leading edge technologies to obtain real-time intelligence, surveillance and reconnaissance, thus creating a "common operating picture" of a more or less traditional battlefield. However, as the recent terrorist attacks in New York and Washington illustrate, we will likely continue to face significant threats from elusive, unconventional enemies operating in the shadows of a nontraditional "battlefield." Moreover, because of the proliferation of cheap, dual-use information technology, these enemies may possess now, or acquire in the future, the technical expertise and hardware to further their own political agendas, harass and frustrate U.S. attempts to conduct information operations (perhaps even to the extent of negating U.S. information superiority altogether), or directly attack the U.S. infrastructure or population. Information technology has thus given terrorists their own ability to "see all" on their own traditional battlefield: the populations and civilian infrastructure of the nations they wish to influence or destroy. In order to answer the research question, the monograph will examine how transnational actors use the Internet and related information technologies to further their interests, with special emphasis on unc

Informace o knize

Plný název Terrorist Use of the Internet and Related Information Technologies
Jazyk Angličtina
Vazba Kniha - Brožovaná
Datum vydání 2012
Počet stran 70
EAN 9781288324040
ISBN 9781288324040
Libristo kód 08243624
Nakladatelství Biblioscholar
Váha 141
Rozměry 189 x 246 x 4
Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet