Suggested Topics within your search.
Suggested Topics within your search.
- National security
- Prevention 8
- Cyberterrorism 4
- Emergency management 4
- Government policy 4
- Information technology 4
- International cooperation 4
- Military policy 4
- Security measures 4
- Security, International 4
- Strategic aspects 4
- Technological innovations 4
- Armed Forces 2
- Biological arms control 2
- Biological weapons 2
- Civil rights 2
- Combined operations (Military science) 2
- Computer networks 2
- Crime prevention 2
- Cyberspace 2
- Data processing 2
- Deception (Military science) 2
- Decision making 2
- Decision support systems 2
- Defenses 2
- Disinformation 2
- Environmental aspects 2
- Information warfare 2
- Internal security 2
- Military planning 2
-
1
Strategic intelligence management national security imperatives and information and communications technologies /
Published 2013Table of Contents: “…The public, communication, risk, and national security -- section 3. Technologies, information, and knowledge for national security -- section 4. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Strategic intelligence management national security imperatives and information and communications technologies /
Published 2013Table of Contents: “…The public, communication, risk, and national security -- section 3. Technologies, information, and knowledge for national security -- section 4. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
-
4
-
5
Wars of disruption and resilience cybered conflict, power, and national security /
Published 2011Subjects: “…Information warfare.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Wars of disruption and resilience cybered conflict, power, and national security /
Published 2011Subjects: “…Information warfare.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
The future of violence : robots and germs, hackers and drones--confronting a new age of threat /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
The future of violence : robots and germs, hackers and drones--confronting a new age of threat /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Counterdeception principles and applications for national security
Published 2007“…Artech House intelligence and information operations library.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Homeland security technology challenges from sensing and encrypting to mining and modeling /
Published 2008“…Artech House intelligence and information operations series.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Homeland security technology challenges from sensing and encrypting to mining and modeling /
Published 2008“…Artech House intelligence and information operations series.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Counterdeception principles and applications for national security
Published 2007“…Artech House intelligence and information operations library.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Scientific support for the decision making in the security sector
Published 2007“…NATO science for peace and security series. D. Information and communication,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
14
Scientific support for the decision making in the security sector
Published 2007“…NATO science for peace and security series. D. Information and communication,…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
The Marine Corps War College Strategy Primer /
Published 2021Table of Contents: “…Introduction: The purpose of the Marine Corps War College Strategy Primer -- The strategic environment -- Sources and drivers of policy -- Ends and problem framing -- Ways and means -- Compare, test, and select, Part I : Limitations and validation -- Compare, test, and select, Part II : Strategy option assessment -- Strategy implementation, evaluation, and revision -- Appendix A: Assumptions -- Appendix B: Heuristics and cognitive biases in decision making -- Appendix C: Strength of interest comparison -- Appendix D: Additional strategic approaches -- Appendix E: Expanded information on diplomatic and economic instruments -- Appendix F: Additional subject areas for comparative analysis of potential strategies -- Appendix G: Additional strategy assessment tools -- Appendix H: Structured analytic techniques and tools.…”
Full text available:
Electronic eBook -
16
The Marine Corps War College Strategy Primer /
Published 2021Table of Contents: “…Introduction: The purpose of the Marine Corps War College Strategy Primer -- The strategic environment -- Sources and drivers of policy -- Ends and problem framing -- Ways and means -- Compare, test, and select, Part I : Limitations and validation -- Compare, test, and select, Part II : Strategy option assessment -- Strategy implementation, evaluation, and revision -- Appendix A: Assumptions -- Appendix B: Heuristics and cognitive biases in decision making -- Appendix C: Strength of interest comparison -- Appendix D: Additional strategic approaches -- Appendix E: Expanded information on diplomatic and economic instruments -- Appendix F: Additional subject areas for comparative analysis of potential strategies -- Appendix G: Additional strategy assessment tools -- Appendix H: Structured analytic techniques and tools.…”
Full text available:
Electronic eBook -
17
Terrorism, war, or disease? unraveling the use of biological weapons /
Published 2008Table of Contents: “…Tucker -- Building information networks for bio-security / Anne L. Clunan -- Conclusion: the role of attribution in bio-security policy / Susan B. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Terrorism, war, or disease? unraveling the use of biological weapons /
Published 2008Table of Contents: “…Tucker -- Building information networks for bio-security / Anne L. Clunan -- Conclusion: the role of attribution in bio-security policy / Susan B. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
-
20