Reviews
Description
The United States has historically maintained a technological edge over its adversaries, used that edge to deter and, if necessary, defeat those adversaries in battle. The question to be examined in this research project is as follows. Have potential third world adversaries acquired advanced computer system capabilities that threaten the security of the United States? The method employed is to first research trends in global computer system availability to include export policy, trade agreements, and the changing strategic environment. Next, I examine a representative group of Third World countries to assess their capabilities and examine the vulnerabilities of the US as it pursues its interests. Finally, I present proposed solutions to the threat based upon the writings of military and civilian experts in the field of information warfare.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 17d.17:15:55
The discount code is valid when purchasing from 10 €. Discounts do not stack.
The United States has historically maintained a technological edge over its adversaries, used that edge to deter and, if necessary, defeat those adversaries in battle. The question to be examined in this research project is as follows. Have potential third world adversaries acquired advanced computer system capabilities that threaten the security of the United States? The method employed is to first research trends in global computer system availability to include export policy, trade agreements, and the changing strategic environment. Next, I examine a representative group of Third World countries to assess their capabilities and examine the vulnerabilities of the US as it pursues its interests. Finally, I present proposed solutions to the threat based upon the writings of military and civilian experts in the field of information warfare.
Reviews