Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Andrew Lewis' Great-great-great-great-grandson, Lieutenant Colonel (ret.) James Lewis Montague
  • Language: en
  • Pages: 4
Ethics in International Relations
  • Language: en

Ethics in International Relations

  • Type: Book
  • -
  • Published: 1998
  • -
  • Publisher: Unknown

None

Rethinking Cybersecurity
  • Language: en
  • Pages: 46

Rethinking Cybersecurity

Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.

Space Exploration in a Changing International Environment
  • Language: en
  • Pages: 33

Space Exploration in a Changing International Environment

This CSIS Report examines the strategic implications of manned space exploration. The current phase of exploration is coming to an end, and nations are seeking the next step. The decisions of the United States and its partners on the future of space exploration will determine the strategic situation in space. There are difficult issues to consider in moving ahead: the target of exploration beyond LEO, the balance between manned and unmanned programs, the future of partnership and cooperation in space, and the ultimate fate of the ISS. How Western space powers answer these questions will determine both the pace and the future direction of exploration in space.

Cyber Security
  • Language: en
  • Pages: 172

Cyber Security

  • Type: Book
  • -
  • Published: 2003
  • -
  • Publisher: CSIS

"This volume looks at the challenges of cyberspace in an interdependent world and at the need for new, cooperative modes of governance to build cyber security. Making networks and critical infrastructure secure requires competent domestic strategies. But it also requires a willingness among governments to take the lead in supporting one another through effective legal structures and agreements such as the Council of Europe Convention on Cybercrime. The authors explore informal and formal bilateral and multilateral approaches to transnational cooperation on cyber security and examine the elements needed for success."--BOOK JACKET.

Building an Information Technology Industry in China, National Strategy, Global Markets
  • Language: en
  • Pages: 48
Scientology
  • Language: en
  • Pages: 462

Scientology

Scientology is arguably the most persistently controversial of all contemporary New Religious Movements. James R. Lewis has assembled an unusually comprehensive anthology, incorporating a wide range of different approaches. In this book, a group of well-known scholars of New Religious Movements offers an extensive and evenhanded overview and analysis of all of these aspects of Scientology, including the controversies to which it continues to give rise.

Intellectual Property Protection
  • Language: en
  • Pages: 98

Intellectual Property Protection

  • Categories: Law
  • Type: Book
  • -
  • Published: 2008
  • -
  • Publisher: CSIS

A report of the CSIS Technology and Public Policy Program.

Computer Exports and National Security
  • Language: en
  • Pages: 72

Computer Exports and National Security

  • Type: Book
  • -
  • Published: 2001
  • -
  • Publisher: CSIS

Export controls on computers and microprocessors have been a politically charged subject for much of the last decade. This volume reaches three broad conclusions: (1) Current export controls on computers and microprocessors are ineffective, given the global diffusion of information technology and rapid increases in performance; (2) the United States should eliminate these Cold War controls and strengthen military and proliferation-related controls; and (3) the trends that make computer export controls ineffective could damage national security if the United States does not use new information technologies to retain its military advantage over potential opponents.