Listing 1 - 10 of 57 | << page >> |
Sort by
|
Choose an application
This report assesses the tradecraft of intelligence analysis across the main U.S. intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, and recommends improvements. The report makes a number of recommendations for improving analysis for a world of threats very different from that of the Cold War. It focuses on the two essentials of analysis-first, people; second, the tools they have available. The December 2004 intelligence reform legislation set in motion initiatives that move in the right direction. The creation of a Deputy Director of National
Intelligence service. --- Intelligence service --- National security --- Homeland defense --- Homeland security
Choose an application
Homeland Security: The Essentials sets a new standard for security textbooks, concisely outlining the risks facing the US today and the structures we have put in place to deal with them. The authors expertly delineate the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters. From cyber warfare to devastating tornados to car bombs, all hazards currently fall within the purview of the Department of Homeland Security. Yet the federal role must be closely aligned with the work of partners in the private sector, and the authors examine t
Terrorism --- National security --- Emergency management --- Civil defense --- Prevention --- Government policy --- Homeland defense --- Homeland security
Choose an application
Although military policy seems focused on overseas threats, defending the ""homeland"" is, of course, the ultimate objective. This guide examines emergent threats to the USA homeland such as speciality weapons, cyber attacks and ballistic missiles and delineates the army's responsibilities.
National security --- United States. --- United States --- Defenses. --- Homeland defense --- Homeland security --- U.S. Army --- US Army
Choose an application
National security --- World politics --- United States --- Military relations. --- Military policy. --- Homeland defense --- Homeland security
Choose an application
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in a
Cyberterrorism --- Computer security --- National security --- Prevention. --- Homeland defense --- Homeland security --- Information Technology --- General and Others
Choose an application
This book examines the Army's role in the war on terrorism; the Army's homeland security needs; the implications of increased emphasis on Asia; the Army's role in coalition operations; the unfinished business of jointness-the lessons learned from operations and how to prepare for the future; the Army's deployability, logistical, and personnel challenges; and whether the Army can afford its Transformation. These examinations are bracketed by an introduction, a description of the Army's place in the new national security strategy, and a summary of the authors' conclusions.
National security --- World politics --- United States. --- United States --- Military policy. --- Homeland defense --- Homeland security --- U.S. Army --- US Army
Choose an application
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate
Crime prevention --- Terrorism --- Surveillance detection. --- National security --- Internal security --- Prevention. --- Loyalty-security program, 1947 --- -Homeland defense --- Homeland security --- Detection of surveillance --- SD (Surveillance detection)
Choose an application
In 2007, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these imports and U.S. national security and assesses the economic, political, and military costs and benefits of potential policies to alleviate imported oil-related challenges to U.S. national security.
Petroleum industry and trade. --- Petroleum industry and trade --- Energy policy --- Petroleum reserves --- National security --- Industries --- Business & Economics --- Government policy --- Homeland defense --- Homeland security --- Petroleum --- Reserves
Choose an application
Following the attacks of September 11, 2001, many agencies within the federal government began restricting some of their publicly available geospatial data and information from such sources as the World Wide Web. As time passes, however, decisionmakers have begun to ask whether and how such information specifically helps potential attackers, including terrorists, to select U.S. homeland sites and prepare for better attacks. The research detailed in this book aims to assist decisionmakers tasked with the responsibility of choosing which geospatial information to make available and which to rest
Civil defense--United States. --- Geographic information systems--Defense measures--United States. --- Civil defense --- Geographic information systems --- Defense measures --- Geographical information systems --- GIS (Information systems) --- Homeland defense --- Homeland security --- Information storage and retrieval systems --- Geography
Choose an application
An exploration of how and why the United States came to adopt its export policies on military and dual-use items, by examining the administrations of four presidents: Truman, Eisenhower, Bush, and Clinton.
Economic sanctions, American. --- Export controls. --- Export controls - United States. --- National security. --- United States. --- International Commerce --- Commerce --- Business & Economics --- Export controls --- National security --- United States --- Commercial policy. --- Politics and government. --- Homeland defense --- Homeland security --- American economic sanctions --- Government --- History, Political
Listing 1 - 10 of 57 | << page >> |
Sort by
|