Information Technology for Counterterrorism: Immediate Actions and Future Possibilities

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf

Puntos de vista:

818

Idioma:

Inglés

Clasificación:

0

Departamento:

tecnología

Número de páginas:

0

Sección:

hardware

Tamaño del archivo:

2780170 MB

calidad del libro :

Excelente

descargar un libro:

52

Notificación

Debido a la actualización del sitio, la descarga se detendrá temporalmente hasta que se complete la actualización. [email protected]

John Leroy Hennessy (nacido el 22 de septiembre de 1952) es un informático, académico y empresario estadounidense que se desempeña como presidente de Alphabet Inc. Hennessy es uno de los fundadores de MIPS Computer Systems Inc., así como de Atheros y se desempeñó como el décimo presidente de Universidad Stanford. Hennessy anunció que dejaría el cargo en el verano de 2016. Marc Tessier-Lavigne lo sucedió como presidente. Marc Andreessen lo llamó "el padrino de Silicon Valley".

Junto con David Patterson, Hennessy recibió el Premio Turing 2017 por su trabajo en el desarrollo de la arquitectura de computadora con conjunto de instrucciones reducido (RISC), que ahora se usa en el 99% de los nuevos chips de computadora.

Descripción del libro

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf por John L. Hennessy

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks

Reseña del libro

0

out of

5 stars

0

0

0

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

Más libros John L. Hennessy

Computer Architecture ,A Quantitative Approach
Computer Architecture ,A Quantitative Approach
hardware
1005
English
John L. Hennessy
Computer Architecture ,A Quantitative Approach pdf por John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface
Computer Organization and Design: The Hardware,Software Interface
hardware
882
English
John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface pdf por John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach
A solution manual to Computer Architecture: A Quantitative Approach
hardware
768
English
John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach pdf por John L. Hennessy
Leading Matters: Lessons from My Journey
Leading Matters: Lessons from My Journey
hardware
828
English
John L. Hennessy
Leading Matters: Lessons from My Journey pdf por John L. Hennessy

Más libros hardware

Practical Digital Electronics for Technicians
Practical Digital Electronics for Technicians
1550
English
Unspecified writer
Practical Digital Electronics for Technicians pdf por Unspecified writer
Fuzzy Hardware: Architectures and Applications
Fuzzy Hardware: Architectures and Applications
1135
English
Marco Russo
Fuzzy Hardware: Architectures and Applications pdf por Marco Russo
Computer Organization and Architecture
Computer Organization and Architecture
1315
English
William Stallings
Computer Organization and Architecture pdf por William Stallings

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.