Home > Tags: u.s (Total 13 Records)
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
Computers (Other) By:National Research Council 2010-10-30 00:00:00
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to conside Computers (Other)
Tags: developing policy strategies proceedings options deterring cyberattacks informing u.s
Threat Level Red: Cybersecurity Research Programs of the U.S. Government
Security By:Michael Erbschloe 2017-07-19 00:00:00
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publiciz Security
Tags: program government cybersecurity research level threat u.s
Competition and Chaos: U.S. Telecommunications since the 1996 Telecom Act
Telecommunications By:Robert W. Crandall 2005-04-26 00:00:00
The 1996 Telecommunications Act was an attempt to increase competition among telecommunications providers in the United States by reducing regulatory barriers to market entry. This competition was expected to drive innovation in the telecommunications sector and reap economic benefits for both Ameri telecom stock market, telecommunications providers, markedly different impact, telecom act, major telecommunications providers
AF Visual 018 - Late War U.S. Tanks: The M26 Pershing, M24 Chaffee and M40 Series
Microsoft Office By:David Doyle 2005-00-00 00:00:00
Photos throughout illustrate the manufacture, combat use and walk around pictures of the M26 Pershing, showing first production batch T26E3, and T26E4 Super Pershing, M24 Chaffee, and M40 self-propelled 155mm gun, based on the M4A3E8 Sherman. war u.s. tanks, late war u.s., t26e4 super pershing, m40 series, af visual
Graphic Design America 3: Portfolios from the Best and Brightest Design Firms from Across the U.S.
Graphics By:Jenny Sullivan 2005-05-01 00:00:00
The latest installment in Rockport's Graphic Design America series is sure to top the previous two best-selling volumes. Like its predecessors, Graphic Design America 3 profiles more than 35 of the graphic designers and graphic design firms in the United States. The work being produced in America is graphic design, brightest design firms, graphic design america, design america series, graphic design firms
Tags: design graphic across america u.s firms portfolios brightest
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
Hacking By:Committee on Deterring Cyberattacks: Informing Strategies and Developing Options 2010-09-30 00:00:00
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to conside passive cybersecurity defense, national research council, developing options, two-phase project, information technology
Tags: developing policy strategies proceedings options deterring cyberattacks informing u.s
Japan's Software Factories: A Challenge to U.S. Management
Computer Science By:Michael A. Cusumano 1991-03-07 00:00:00
Though Japan has successfully competed with U.S. companies in the manufacturing and marketing of computer hardware, it has been less successful in developing computer programs. This book contains the first detailed analysis of how Japanese firms have tried to redress this imbalance by applying their u.s. software factories, usable portions, u.s. companies, detailed analysis, large numbers
Tags: software management u.s factories
Patriots for Profit: Contractors and the Military in U.S. National Security
Security By:Thomas Bruneau 2011-07-18 00:00:00
This book develops a new approach to the analysis of civil-military relations by focusing on the effectiveness of the armed forces in fulfilling roles & missions, and on their efficiency in terms of cost. The approach is applied to the United States using official documents and interviews with polic u.s. national, phenomenon of contracting-out security that has resulted in, u.s. national securitythis, private security contractors, uniformed military personnel.
Tags: security national profit military u.s patriots contractors
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
Hacking By:Committee on Deterring Cyberattacks: Informing Strategies and Developing Options 2010-09-30 00:00:00
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to conside developing options, passive cybersecurity defense, national research council, strategies, two-phase project
Tags: developing policy strategies proceedings options deterring cyberattacks informing u.s
The New Global Ecosystem in Advanced Computing: Implications for U.S. Competitiveness and National Security
Computer Science By:Committee on Global Approaches to Advanced Computing 2012-10-23 00:00:00
This issue outlines the technical challenges, describe the global research landscape, and explore implications for competition and national security. Computing and information and communications technology (ICT) gas dramatically changed how we work and live, has had profound effects on nearly eve new global ecosystem, profound effects, national security, global research landscape, national securitythis issue
Tags: security computing global national implications u.s ecosystem