61,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

The United States has historically maintained a technological edge over its adversaries, used that edge to deter and, if necessary, defeat those adversaries in battle. The question to be examined in this research project is as follows. Have potential third world adversaries acquired advanced computer system capabilities that threaten the security of the United States? The method employed is to first research trends in global computer system availability to include export policy, trade agreements, and the changing strategic environment. Next, I examine a representative group of Third World…mehr

Produktbeschreibung
The United States has historically maintained a technological edge over its adversaries, used that edge to deter and, if necessary, defeat those adversaries in battle. The question to be examined in this research project is as follows. Have potential third world adversaries acquired advanced computer system capabilities that threaten the security of the United States? The method employed is to first research trends in global computer system availability to include export policy, trade agreements, and the changing strategic environment. Next, I examine a representative group of Third World countries to assess their capabilities and examine the vulnerabilities of the US as it pursues its interests. Finally, I present proposed solutions to the threat based upon the writings of military and civilian experts in the field of information warfare.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.