Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Porche III, Isaac R"'
Autor:
Porche, III, Isaac R.
Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies t
Autor:
Yeung, Douglas, Douglas, Porche III, Isaac R, Roshan, Parisa, Sieck, Katharine, Soliman, Sarah, Brown, Ryan Andrew, Bordeaux, John, Cevallos, Astrid Stuth, Gulden, Timothy R., Kupe, Laura, Matthews, Luke J., Mendelsohn, Joshua, Osoba, Osonde A.
This report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and
Publikováno v:
Military Operations Research. 2009, Vol. 14 Issue 4, p21-39. 19p.
Publikováno v:
U.S. Naval Institute Proceedings. Oct2012, Vol. 138 Issue 10, p34-39. 6p.
Publikováno v:
Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence; 2023, Issue 29, p6-32, 27p
Autor:
RISTOSKI, Tomica
Publikováno v:
Contemporary Macedonian Defense / Sovremena Makedonska Odbrana; Jun2022, Vol. 22 Issue 42, p145-150, 6p
Autor:
Jan Goldman, Susan Maret
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theor
•This book is in the Rapid Communications in Conflict and Security (RCCS) Series (General Editor: Thomas G. Mahnken; Founding Editor: Geoffrey R.H. Burn) Winning Without Fighting: Irregular Warfare and Strategic Competition in the 21st Century prov
Autor:
Yuliya Zabyelina, Kimberley L. Thachuk
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses. It advances the existing scholarship on attacks,