Search
for Topics
All Reviews
Browse All Reviews
>
Computer Applications (J)
>
Administrative Data Processing (J.1)
> Military (J.1...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 11 Reviews about "
Military (J.1...)
":
Date Reviewed
Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)
A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state...
Jul 16 2020
Waging cyber war: technical challenges and operational constraints
Oakley J., Apress, New York, NY, 2019. 212 pp. Type: Book (978-1-484249-49-9)
The general population as well as industry and government are largely aware of the cyber threat risks to personal computers (PCs), smartphones, intelligent devices, servers, and networks. Attacks and hackers have hit all of these, expl...
May 15 2020
Conflict and complexity: countering terrorism, insurgency, ethnic and regional violence
Fellman P., Bar-Yam Y., Minai A., Springer International Publishing, New York, NY, 2015. 292 pp. Type: Book (978-1-493917-04-4)
The 32 authors who have contributed to this book’s 16 chapters include military experts, political scientists, psychologists, economists, sociologists, and complexity scientists. Their objective is to show how concepts from t...
Aug 15 2017
Dark territory: the secret history of cyber war
Kaplan F., Simon & Schuster, New York, NY, 2016. 352 pp. Type: Book (978-1-476763-25-5)
This book amazes on many levels. First, the level of detail is staggering. Dates, names, conversations--the facts sometimes come so fast and furious you have to stop and take a breath. This is old-school journalistic research,...
Jun 7 2016
Applications of mathematics and informatics in military science
Daras N., Springer Publishing Company, Incorporated, New York, NY, 2012. 259 pp. Type: Book (978-1-461441-08-3)
A collection of presentations from a conference held in April 2011 at the Hellenic Army Academy, this book covers various mathematical methods that might be employed in advanced military applications....
Feb 12 2013
Computational analysis of terrorist groups: Lashkar-e-Taiba
Subrahmanian V., Mannes A., Sliva A., Shakarian J., Dickerson J., Springer Publishing Company, Incorporated, New York, NY, 2012. 245 pp. Type: Book (978-1-461447-68-9)
In this book, the authors provide a comprehensive computational analysis of how the terrorist group Lashkar-e-Taiba operates. It was the first long-term study ever published on the behavior of the terrorist group Lashkar-e-Taiba, which...
Feb 5 2013
Training the cyber warrior
Fulp J. In
Security education and critical infrastructures
. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
As the title suggests, this chapter uses military principles and terminology to describe important components of an information technology education: security and maintaining information assurance. The paper is clearly written and well...
Jan 5 2004
Security education for times of netwar and peace
Dockal J. In
Security education and critical infrastructures
. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Dockal reviews the efforts in information assurance and security (IA&S), as well as ancillary areas such as cryptology, in the Czech Republic by providing an overview of the curricula in this area for the major Czech universiti...
Nov 24 2003
Making intelligence smarter
Zorpette G. IEEE Spectrum 39(1): 38-43, 2002. Type: Article
The focus of this lucid and worthwhile paper about US intelligence efforts is not computing, as successful intelligence work in the future will require human spies and cooperation among agencies, as well as technology. ...
Jan 23 2003
Strategic appraisal
Khalilzad Z., White J., RAND, Santa Monica, CA, 1999. Type: Book (9780833026637)
The 15 essays in this collection deal with real and perceived impacts on US national security resulting from continuing changes in the capabilities of advanced information technologies and their use by friendly and hostile forces. This...
Aug 1 1999
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy