• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar

OnlineProgrammingBooks.com

Legally Free Computer Books

  • All Categories
  • All Books
  • All Categories
  • All Books
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact
You are here: Home ▶ Information Technology (IT) ▶ Information Technology for Counterterrorism

Information Technology for Counterterrorism

March 24, 2006

Information Technology for Counterterrorism

This report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack.

Book Description

The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term.

Table of Contents

  • Background and Introduction
  • Types of Threats Associated with Information Technology Infrastructure
  • Investing in Information Technology Research
  • What Can Be Done Now?
  • Rationalizing the Future Research Agenda

Download Free PDF / Read Online

Author(s): John L. Hennessy, David A. Patterson, and Herbert S. Lin
Format(s): PDF
Number of pages: 144
Link: Download.

Similar Books:

  1. Information Technology for Manufacturing
  2. Information Technology in the Service Society
  3. Supercomputers: Directions in Technology and Applications
  4. The Future of Supercomputing
  5. The Unpredictable Certainty: Information Infrastructure Through 2000
Previous Post: « Writing Bug-Free C Code
Next Post: Creating Applications with Mozilla »

Primary Sidebar

Get Latest Updates

  • Facebook
  • Pinterest
  • RSS
  • Twitter
  • YouTube
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact

Copyright © 2006–2023 OnlineProgrammingBooks.com