Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Undetermined  (17)
  • Spanish
  • Libicki, Martin C.  (17)
  • [Erscheinungsort nicht ermittelbar] : RAND Corporation  (17)
  • [Erscheinungsort nicht ermittelbar] : De Gruyter
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833092526 , 9780833092496
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Network security ; Computer security ; Asian history
    Abstract: This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833091031 , 9780833089113
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer viruses, Trojans & worms ; Information technology: general issues ; Digital lifestyle
    Abstract: Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833090904 , 9780833091109
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer security ; Human rights & civil liberties law ; Communications engineering / telecommunications
    Abstract: This report examines the portfolio of tools funded by the State Department’s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expression, freedom of the press, and the free flow of information) without enabling criminal activity
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833085740
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer viruses, Trojans & worms ; Digital lifestyle ; Medical bioinformatics
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833085030 , 9780833085009
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Digital lifestyle ; Warfare & defence ; Political control & freedoms
    Abstract: The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833080042
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Network security ; Arms negotiation & control ; Military engineering
    Abstract: Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks. Such “brandishing” is no panacea and could even backfire if misinterpreted. Its success also relies on the strength of other elements of the deterrence posture
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833080660 , 9780833080639
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Asian history ; Middle Eastern history
    Abstract: The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of China, Egypt, Russia, and Syria, and also draws parallels between Internet freedom and Radio Free Europe programs during the Cold War
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833076793 , 9780833076786
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer viruses, Trojans & worms ; Network security ; Computer security
    Abstract: The chances are growing that the United States will find itself in a crisis in cyberspace—the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833079879 , 9780833077073
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Military history ; Espionage & secret services ; Military engineering
    Abstract: As the need to identify known and suspected combatants has elevated the importance of biometrics in the Department of Defense (DoD), RAND researchers assessed how current activities are supporting end users and how DoD is preparing to focus biometrics on different missions. As overseas contingency operations wind down, DoD’s biometrics program must move in a new direction, and continued funding must be justified in new ways
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833052476 , 9780833051776
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Warfare & defence ; Population & demography
    Abstract: What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833049834 , 9780833049520
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Warfare & defence ; Political ideologies ; Military engineering
    Abstract: RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts include that modern insurgencies last about ten years; withdrawal of state support cripples insurgencies; civil defense forces are useful for both sides; pseudodemocracies fare poorly against insurgents; and governments win more often in the long run
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833047120 , 9780833046840
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: International relations ; Warfare & defence ; Military engineering
    Abstract: The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. To solve this problem, a new RAND study proposes a "continuum of force"--a suite of capabilities that includes sound, light, lasers, cell phones, and video cameras. These technologies are available but have received insufficient attention
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833048752 , 9780833047342
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer security ; Terrorism, armed struggle ; Military engineering
    Abstract: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : RAND Corporation
    ISBN: 9780833046406 , 9780833044655
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: International relations ; Military engineering
    Abstract: All terrorist groups eventually end. But how do they end? The evidence since 1968 indicates that most groups have ended because (1) they joined the political process (43 percent) or (2) local police and intelligence agencies arrested or killed key members (40 percent). Military force has rarely been the primary reason for the end of terrorist groups, and few groups within this time frame have achieved victory. This has significant implications for dealing with al Qa?ida and suggests fundamentally rethinking post-9/11 U.S. counterterrorism strategy: Policymakers need to understand where to prioritize their efforts with limited resources and attention. The authors report that religious terrorist groups take longer to eliminate than other groups and rarely achieve their objectives. The largest groups achieve their goals more often and last longer than the smallest ones do. Finally, groups from upper-income countries are more likely to be left-wing or nationalist and less likely to have religion as their motivation. The authors conclude that policing and intelligence, rather than military force, should form the backbone of U.S. efforts against al Qa?ida. And U.S. policymakers should end the use of the phrase ?war on terrorism? since there is no battlefield solution to defeating al Qa?ida
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833042880 , 9780833041890
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Computer security ; Warfare & defence
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be made tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that todayÂ's military and intelligence networks-being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters-hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833042484 , 9780833039132
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: International relations ; Terrorism, armed struggle
    Abstract: Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833034106 , 9780833032898
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: International relations ; Terrorism, armed struggle
    Abstract: The collapse of the Soviet Union and the end of the Cold WarÑand then the terrorist attacks of September 11, 2001Ñtransformed the task of American foreign and defense policymaking. This book outlines the dimensions of that transformation and sketches new tools for dealing with the policy challengesÑfrom modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...