This report, the second in a series, reveals insights from chief information security officers; examines network defense measures and attacker-created countermeasures; and explores software vulnerabilities and inherent weaknesses.

Weitere Produkte vom selben Autor

World Atlas of Beer Webb, Tim, Beaumont, Stephen

45,50 €*
Chinese Responses to Us Military Transformation & Implicat Rand Corporation, Chase, Michael S, Frelinger, David R, Libicki, Martin C, Tanner, Murray Scott

26,00 €*
Root Cause Analyses of Nunn-McCurdy Breaches Blickstein, Irv, Drezner, Jeffrey A, Libicki, Martin C, McInnis, Brian, McKernan, Megan, Nemfakos, Charles, Sollinger, Jerry M, Wong, Carolyn

37,00 €*
Acquisition of Space Systems Kim, Yool, Sollinger, Jerry M, York, Erin, Arena, Mark V, Blickstein, Irv, Shelton, William, Axelband, Elliot, Doll, Abby, Eisman, Mel, Hura, Myron, Keating, Edward G, Libicki, Martin C, Martin, Bradley, McMahon, Michael E

25,50 €*