首页> 外文期刊>Computing reviews >Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
【24h】

Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace

机译:和平与安全信息技术:冲突,危机,战争与和平的IT应用和基础设施

获取原文
获取原文并翻译 | 示例
           

摘要

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like "state actors" and "organized crime" to indicate powerful and resourceful adversaries. Similarly, the label "critical infrastructure" is an indicator of the threat level. This book expands and clarifies this basic context view dramatically in many directions. The book is split into seven parts: "Introduction and Fundamentals" (60 pages), "Cyber Conflicts and War" (75 pages), "Cyber Peace" (65 pages), "Cyber Arms Control" (70 pages), "Cyber Attribution and Infrastructures" (60 pages), "Culture and Interaction" (60 pages), and "Outlook" (15 pages). Each part consists of three contributions. Each contribution provides its objectives, questions to test your understanding, and references.
机译:与此标题的一本书似乎只是对不战斗或保持和平的企业安全人员来说略微相关。但是,在典型的上下文安全分析中,您将找到“国家演员”和“有组织犯罪”等术语,以表明强大而有资格的对手。同样,标签“关键基础架构”是威胁级别的指标。本书扩展并在许多方向上显着阐明了此基本上下文视图。本书分为七个部分:“介绍和基本面”(60页),“网络冲突和战争”(75页),“网络和平”(65页),“网络武器控制”(70页),“网络归因和基础设施“(60页),”文化和互动“(60页)和”Outlook“(15页)。每个部分都包括三个贡献。每项贡献都提供了其目标,以测试您的理解和参考资料。

著录项

  • 来源
    《Computing reviews》 |2020年第12期|388-389|共2页
  • 作者

    A. Marieen;

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号