GSTDTAP

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
China's Cyber Sovereignty 科技报告
来源:Center for International Climate and Environmental Research-Oslo (CICERO). 出版年: 2017
作者:  Schia, Niels Nagelhus;  Gjesvik, Lars
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/05
Suverenitet  Sovereignty  Kina  Chinese public administration  Cyber security  Cyber diplomacy  VDP::Samfunnsvitenskap: 200  VDP::Social sciences: 200  
Getting to Yes with China in Cyberspace 科技报告
来源:Rand Corporation. 出版年: 2016
作者:  Scott Warren Harold;  Martin C. Libicki;  Astrid Cevallos
收藏  |  浏览/下载:21/0  |  提交时间:2019/04/05
International Diplomacy  Cybercrime  RAND-initiated  Information Security  China  The Internet  United States  Cyber Warfare  
Thought Leadership programme 2016: Key Findings 科技报告
来源:Rand Corporation. 出版年: 2016
作者:  Catriona Manville;  Claire Alexander;  Brian Parry
收藏  |  浏览/下载:16/0  |  提交时间:2019/04/05
The Internet  Information Security  Cyber Warfare  Cybercrime  Health Information Technology  Information Privacy  
Security Sector Reform in Ukraine 科技报告
来源:Rand Corporation. 出版年: 2016
作者:  Olga Oliker;  Lynn E. Davis;  Keith Crane;  Andrew Radin;  Celeste Gventer;  Susanne Sondergaard;  James T. Quinlivan;  Stephan B. Seabrook;  Jacopo Bellasio;  Bryan Frederick;  et al.
收藏  |  浏览/下载:21/0  |  提交时间:2019/04/05
Ukraine  Military Doctrine  Security Cooperation  Cyber Warfare  Information Security  Politics and Government  Students  
The Power to Coerce: Countering Adversaries Without Going to War 科技报告
来源:Rand Corporation. 出版年: 2016
作者:  David C. Gompert;  Hans Binnendijk
收藏  |  浏览/下载:11/0  |  提交时间:2019/04/05
Global Security  International Diplomacy  Russia  China  International Economic Relations  Cyber Warfare  Iran  
Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses 科技报告
来源:Rand Corporation. 出版年: 2015
作者:  Nicole van der Meulen;  Eun Jo;  Stefan Soesanto
收藏  |  浏览/下载:78/0  |  提交时间:2019/04/05
Cybercrime  European Union  The Internet  United States  Cyber Warfare  Information Security  Computer Viruses  
Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles 科技报告
来源:Rand Corporation. 出版年: 2015
作者:  Don Snyder;  James D. Powers;  Elizabeth Bodine-Baron;  Bernard Fox;  Lauren Kendrick;  Michael Powell
收藏  |  浏览/下载:24/0  |  提交时间:2019/04/05
Information Security  Cyber Warfare  Military Acquisition and Procurement  Military Information Technology Systems  United States Air Force  
Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts 科技报告
来源:Rand Corporation. 出版年: 2015
作者:  Don Snyder;  George E. Hart;  Kristin F. Lynch;  John G. Drew
收藏  |  浏览/下载:12/0  |  提交时间:2019/04/05
Combat Support Operations  Cyber Warfare  Information Security  Information Operations  Netcentric Warfare  Military Information Technology Systems  
Training Cyber Warriors: What Can Be Learned from Defense Language Training? 科技报告
来源:Rand Corporation. 出版年: 2015
作者:  Jennifer J. Li;  Lindsay Daugherty
收藏  |  浏览/下载:19/0  |  提交时间:2019/04/05
United States  Workforce Management  Alumni  Cyber Warfare  Military Education and Training  Information Security  
The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017 科技报告
来源:Rand Corporation. 出版年: 2015
作者:  Eric Heginbotham;  Michael Nixon;  Forrest E. Morgan;  Jacob Heim;  Jeff Hagen;  Sheng Li;  Jeffrey Engstrom;  Martin C. Libicki;  Paul DeLuca;  David A. Shlapak;  et al.
收藏  |  浏览/下载:27/0  |  提交时间:2019/04/05
Global Security  Air Warfare  United States  Cyber Warfare  Nuclear Weapons and Warfare  Air Defense  Spratly Islands  Antisubmarine Warfare  Taiwan  Space Warfare  Submarines