You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
Survival, the Institute of Strategic Studies' quarterly journal, is a leading forum for analysis and debate of international and strategic affairs. With a diverse range of authors, eight to ten articles per issue, plus thoughtful reviews and review essays, Survival is scholarly in depth while vivid, well-written and policy-relevant in approach. Shaped by its editors to be both timely and forward-thinking, the journal encourages writers to challenge conventional wisdom and bring fresh, often controversial, perspectives to bear on the strategic issues of the moment.
"This book brings together the many pieces of India's nuclear puzzle and the ramifications for South Asia. The author examines the choices facing India from New Delhi's point of view in order to discern which future courses of action appear most appealing to Indian security managers. He details how such choices, if acted upon, would affect U.S. strategic interests, India's neighbors, and the world."--BOOK JACKET.
"[This] is a narrative describing the actions of Marines in combat during the liberation of Iraq ... Blue Diamond, the 1st Division's Operation Iraqi Freedom nom de guerre, consisted of some 20,000 Marines and Sailors and 8,000 vehicles organized into three regimental combat teams ... '[This] is not a story of each of them, but the story of all of them' ... " -- Foreword.
With the 1st Marine Division in Iraq, 2003: No Greater Friend, No Worse Enemy"The events chronicled here capture the story of the Marines of the "Blue Diamond" as they prepared for war, conquered and army, and liberated a nation. From across America and beyond, they chose the demanding path, to become Marines. These Marines marched in the ranks of this national treasure that we call the 1st Marine Division. And, at a time when timid souls or cynical pundits grew loudest, these men shouldered their weapons and moved without hesitation against the enemy. Our victory was not inevitable. It was the courage, unselfishness, and skill of the young men of Blue Diamond to whom we owe our victory."
In March 2005, the NASA History Division and the Division of Space History at the National Air and Space Museum brought together a distinguished group of scholars to consider the state of the discipline of space history. This volume is a collection of essays based on those deliberations. The meeting took place at a time of extraordinary transformation for NASA, stemming from the new Vision of Space Exploration announced by President George W. Bush in January 204: to go to the Moon, Mars, and beyond. This Vision, in turn, stemmed from a deep reevaluation of NASA?s goals in the wake of the Space Shuttle Columbia accident and the recommendations of the Columbia Accident Investigation Board. The new goals were seen as initiating a "New Age of Exploration" and were placed in the context of the importance of exploration and discovery to the American experiences. (Amazon).
The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for the money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack. --Publisher description.
None
This report assesses military use of commercial wideband satellites by evaluating their effectiveness across several characteristics defined by the United States Space Command. The cost of buying or leasing commercial systems is then found and compared with the cost of buying military systems with commercial characteristics.