feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    almahu_9949576935102882
    Format: 1 online resource (194 p.)
    Edition: 1st ed.
    ISBN: 1-281-18127-7 , 9786611181277 , 0-8330-4288-2
    Series Statement: Rand counterinsurgency study. Paper ; v. 1
    Content: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech
    Note: "RAND National Defense Research Institute." , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography , English
    Additional Edition: ISBN 0-8330-4189-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, CA :RAND,
    UID:
    almahu_9949577234002882
    Format: 1 online resource (268 p.)
    Edition: 1st ed.
    ISBN: 1-282-79724-7 , 9786612797248 , 0-8330-4983-6
    Content: RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts include that modern insurgencies last about ten years; withdrawal of state support cripples insurgencies; civil defense forces are useful for both sides; pseudodemocracies fare poorly against insurgents; and governments win more often in the long run.
    Note: Description based upon print version of record. , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE - Introduction; Purpose of This Monograph; A Note on Contemporary Threats and Operations; Research Approach; Graphs Used in This Monograph; Conventional Wisdom; How This Monograph Is Organized; CHAPTER TWO - Classifying Outcomes and Selecting Cases; Outcomes; Type I: Government Loss; Type II: Government Victory; Type III: Mixed (Stalemate/Negotiated Settlement); Type IV: Inconclusive or Ongoing Outcome; The Tipping Point: Explanation by Way of Example; Key Indicators: A Note of Caution , CHAPTER THREE - Assessments of Insurgency Endings: Time and External FactorsAssessments of Time and External Factors; Duration of Conflict; Sanctuary Available; Outside Intervention in Support of Government; Outside Intervention in Support of Insurgencies; CHAPTER FOUR - Assessments of Insurgency Endings: Internal Factors; Structure; Thailand and the BRN and the P ULO; Urbanization; Uruguay and the Tupamaros; Insurgent Use of Terrorism; Insurgent Strength; System of Government; CHAPTER FIVE - Assessments of Insurgency Endings: Other Factors; Force Ratios; Civil-Defense Forces , CHAPTER SIX - ConclusionsAPPENDIX A - Case Studies: Methodology; APPENDIX B - Supplemental Findings; APPENDIX C - Multivariate Regression Analysis; APPENDIX D - Insurgencies Not Examined for This Publication; APPENDIX E - Categories Used for the Spring 2006 Survey; APPENDIX F - Unavoidable Ambiguities; APPENDIX G - Questions Used for the Autumn 2006 Survey; Glossary; Bibliography , English
    Additional Edition: ISBN 0-8330-4952-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, CA :Rand,
    UID:
    almahu_9949576894402882
    Format: 1 online resource (251 p.)
    ISBN: 1-282-03325-5 , 9786612033254 , 0-8330-4640-3
    Content: All terrorist groups end. But how do they end? Most groups since 1968 have ended because they joined the political process or are defeated by police and intelligence services. This has significant implications for countering al Qa'ida.
    Note: Description based upon print version of record. , Introduction -- How terrorist groups end -- Policing and Japan's Aum Shinrikyo -- Politics and the FMLN in El Salvador -- Military force and Al Qa'ida in Iraq -- The limits of America's Al Qa'ida strategy -- Ending the 'war' on terrorism. , English
    Additional Edition: ISBN 0-8330-4465-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949576899502882
    Format: 1 online resource (415 p.)
    Edition: 1st ed.
    ISBN: 1-282-28275-1 , 9786612282751 , 0-8330-3410-3
    Content: The collapse of the Soviet Union and the end of the Cold WarÑand then the terrorist attacks of September 11, 2001Ñtransformed the task of American foreign and defense policymaking. This book outlines the dimensions of that transformation and sketches new tools for dealing with the policy challengesÑfrom modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of ""best practices"" from the private sector.
    Note: Description based upon print version of record. , PREFACE; CONTENTS; FIGURES; TABLES; ACKNOWLEDGMENTS; ABBREVIATIONS; INTRODUCTION; FROM OLD CHALLENGES TO NEW; HOW THIS VOLUME IS ORGANIZED; PART I. NEW CHALLENGES FOR DEFENSE; INTRODUCTION TO PART I; Chapter One DECISIONMAKING FOR DEFENSE; DECIDING WHAT DECISIONS MUST BE MADE; DECIDING WHO MAKES THE DECISIONS; DECIDING HOW TO ALLOCATE RESOURCES; DECIDING WHAT INVESTMENTS TO MAKE; ALTERNATIVE APPROACHES TO DECISIONMAKING; ALTERNATIVE DECISIONMAKING STYLES; LOOKING TO THE FUTURE; Chapter Two RESPONDING TO ASYMMETRIC THREATS; FROM THE COLD WAR TO THE PRESENT; EXAMPLES OF ASYMMETRIC THREATS , HOW WOULD ADVERSARIES SHAPE ASYMMETRIC THREATS?THE IMPORTANCE OF SURPRISE AND ANONYMITY; CHALLENGE AND RESPONSE CYCLES; THE CHALLENGE OF WEAPONS OF MASS DESTRUCTION; A FRAMEWORK FOR RESPONDING TO ASYMMETRIC THREATS; Institutionalization Through Protection; Institutionalization Through Threat Management; Internationalization; CONCLUSIONS; Chapter Three WHAT INFORMATION ARCHITECTURE FOR DEFENSE?; WHAT IS ARCHITECTURE?; The Global Information Grid; Need There Be Architecture?; Architecture Follows Culture?; DoD as an Institution in Its Own League; ELEMENTS OF ARCHITECTURE; Collection; Access , PresentationNetworking; Knowledge Maintenance and Management; Security; Interoperability; Integration; THE NEED TO THINK NOW; PART II. COPING WITH UNCERTAINTY; INTRODUCTION TO PART II; Chapter Four INCORPORATING INFORMATION TECHNOLOGY IN DEFENSE PLANNING; MODEST PROPOSITIONS ABOUT THE FUTURE; REAL REVOLUTIONS ON THE PHYSICAL BATTLEFIELD; Hitting What Can Be Seen; From Contingency to Necessity; The Coming Architecture of Military Organization; Conventional War, Hyperwar, and Mud Warfare; FALSE REVOLUTIONS ON THE VIRTUAL BATTLEFIELD; What Is Information Warfare?; Electronic Warfare , Command-and-Control WarfarePsychological Operations; The Ghost in the Machine; THE LESSON OF SEPTEMBER 11; Chapter Five UNCERTAINTY-SENSITIVE PLANNING; WHY SO MANY SURPRISES?; CONCEPTUAL STRATEGIC PLANNING; Uncertainty-Sensitive Strategic Planning; Operationalizing Strategic Planning in Portfolio-Management Terms; CAPABILITIES-BASED PLANNING; Key Features; Information Technology and Mission-System Analysis; Multiple Objectives and Measures; The Concept of a Scenario Space (an Assumptions Space); Choices and Resource Allocation; Chapter Six PLANNING THE FUTURE MILITARY WORKFORCE , MILITARY HUMAN CAPITALHistorical Size, Source, and Composition of the Active Force; Ongoing Revolutions: Composition, Characteristics, and Attributes; Looking to the Future; MANPOWER AND PERSONNEL ANALYSIS; The Process; Choosing Among Alternatives, an Example; Chapter Seven THE SOLDIER OF THE 21st CENTURY; VISIONS OF THE FUTURE; Cyber Soldier; Information Warrior; Peace Operations; Rapid Response Force; Low-Manning Vessels; Evolutionary Change; EXPERIENCE OF THE ALL-VOLUNTEER FORCE; Versatility and Leadership; Attracting Quality Personnel; Economic Theories of Compensation , ISSUES FOR THE FUTURE
    Additional Edition: ISBN 0-8330-3289-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, CA :RAND,
    UID:
    almahu_9949577183302882
    Format: 1 online resource (239 p.)
    ISBN: 1-282-39853-9 , 9786612398537 , 0-8330-4875-9
    Content: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
    Note: Description based upon print version of record. , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence , APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences , English
    Additional Edition: ISBN 0-8330-4734-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Santa Monica, CA :RAND,
    UID:
    almahu_9949577209502882
    Format: 1 online resource (131 p.)
    Edition: 1st ed.
    ISBN: 1-281-18091-2 , 9786611180911 , 0-8330-4248-3
    Content: Al Qaeda, the jihadist network personified by Osama bin laden, seeks a restored caliphate free of Western influence. It uses terror as its means. But how does terrorism serve the ends of al Qaeda? Understanding its strategic logic might suggest what U.S. targets it may seek to strike and why. This monograph posits four hypotheses to link means and ends. The coercion hypothesis suggests that terrorists are interested in causing pain, notably casualties, to frighten the United States into pursuing favorable policies (e.g., withdrawing from the Islamic world). The damage hypothesis posits that te
    Note: "MG-483." , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One - Introduction; Chapter Two - What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three - Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four - Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism , The Coercion HypothesisThe Damage Hypothesis; The Rally Hypothesis; The Franchise Hypothesis; Conclusions; Chapter Five - Ramifications for al Qaeda Attack Planning in the United States; Coercion; Damage; Rally; Franchise; Is the United States Off the Target List for the TimeBeing?; Conclusions; Bibliography , English
    Additional Edition: ISBN 0-8330-3913-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, CA :Rand National Defense Research Institute,
    UID:
    almahu_9949576912102882
    Format: 1 online resource (46 pages)
    ISBN: 0-8330-8004-0
    Note: Prepared for the Office of the Secretary of Defense. , English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cambridge :Cambridge University Press,
    UID:
    almahu_9948234189702882
    Format: 1 online resource (xii, 323 pages) : , digital, PDF file(s).
    ISBN: 9780511804250 (ebook)
    Content: With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015).
    Additional Edition: Print version: ISBN 9780521871600
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Annapolis, Maryland :Naval Institute Press,
    UID:
    almafu_BV044221693
    Format: xvi, 478 Seiten : , Illustrationen.
    ISBN: 978-1-68247-032-9
    Note: Includes bibliographical references (pages 423-460) and index
    Additional Edition: Online-Ausgabe, pdf Erscheint auch als ISBN 978-1-68247-033-6
    Language: English
    Keywords: Information warfare ; Internetkriminalität ; Prävention
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1604267127
    Format: XIV, 91 S , 23 cm
    Edition: 1. print
    ISBN: 157906020X
    Note: Includes bibliographical references
    Language: English
    Keywords: NATO ; Informationstechnik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages