Information Technology for Counterterrorism: Immediate Actions and Future Possibilities

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf

Vues:

821

Langue:

Anglais

Notation:

0

département:

technologie

Nombre de pages:

0

Section:

Matériel

Taille du fichier:

2780170 MB

qualité du livre :

Excellent

télécharger un livre:

52

Notification

En raison de la mise à jour du site, le téléchargement sera temporairement arrêté jusquà ce que la mise à jour soit terminée. [email protected]

John Leroy Hennessy (né le 22 septembre 1952) est un informaticien, académicien et homme d'affaires américain qui est président d'Alphabet Inc. Hennessy est l'un des fondateurs de MIPS Computer Systems Inc. ainsi que d'Atheros et a été le dixième président de Université de Stanford. Hennessy a annoncé qu'il se retirerait à l'été 2016. Il a été remplacé à la présidence par Marc Tessier-Lavigne. Marc Andreessen l'appelait "le parrain de la Silicon Valley".

Avec David Patterson, Hennessy a reçu le prix Turing 2017 pour son travail de développement de l'architecture informatique à jeu d'instructions réduit (RISC), qui est maintenant utilisée dans 99 % des nouvelles puces informatiques.

Description du livre

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf par John L. Hennessy

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks

Critique de livre

0

out of

5 stars

0

0

0

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

Plus de livres John L. Hennessy

Computer Architecture ,A Quantitative Approach
Computer Architecture ,A Quantitative Approach
Matériel
1005
English
John L. Hennessy
Computer Architecture ,A Quantitative Approach pdf par John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface
Computer Organization and Design: The Hardware,Software Interface
Matériel
882
English
John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface pdf par John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach
A solution manual to Computer Architecture: A Quantitative Approach
Matériel
768
English
John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach pdf par John L. Hennessy
Leading Matters: Lessons from My Journey
Leading Matters: Lessons from My Journey
Matériel
828
English
John L. Hennessy
Leading Matters: Lessons from My Journey pdf par John L. Hennessy

Plus de livres Matériel

Practical Digital Electronics for Technicians
Practical Digital Electronics for Technicians
1550
English
Unspecified writer
Practical Digital Electronics for Technicians pdf par Unspecified writer
Fuzzy Hardware: Architectures and Applications
Fuzzy Hardware: Architectures and Applications
1135
English
Marco Russo
Fuzzy Hardware: Architectures and Applications pdf par Marco Russo
Computer Organization and Architecture
Computer Organization and Architecture
1315
English
William Stallings
Computer Organization and Architecture pdf par William Stallings

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.