Strategic Information Warfare A New Face of War
Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnera...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
1996
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_114834 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s1996 xx |||||o ||| 0|eng d | ||
020 | |a MR661OSD | ||
020 | |a 9780833048462 | ||
020 | |a 9780833023520 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/MR661OSD |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a HBW |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Molander, Roger C. |4 auth | |
700 | 1 | |a Riddile, Andrew |4 auth | |
700 | 1 | |a Wilson, Peter A. |4 auth | |
700 | 1 | |a Williamson, Stephanie |4 auth | |
245 | 1 | 0 | |a Strategic Information Warfare |b A New Face of War |
260 | |b RAND Corporation |c 1996 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Military history |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a Technology | ||
653 | |a History | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/MR661OSD |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/114834 |7 0 |z DOAB: description of the publication |