Information Technology for Counterterrorism: Immediate Actions and Future Possibilities

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf

Visualizzazioni:

824

Lingua:

inglese

Valutazione:

0

Dipartimento:

tecnologia

Numero di pagine:

0

Sezione:

hardware

Dimensione del file:

2780170 MB

qualità del libro :

Eccellente

scarica un libro:

52

Notifica

A causa dell aggiornamento del sito, il download verrà temporaneamente interrotto fino al completamento dell aggiornamento [email protected]

John Leroy Hennessy (nato il 22 settembre 1952) è uno scienziato informatico, accademico e uomo d'affari americano che ricopre il ruolo di presidente di Alphabet Inc. Hennessy è uno dei fondatori di MIPS Computer Systems Inc. e di Atheros ed è stato il decimo presidente di Università di Stanford. Hennessy ha annunciato che si sarebbe dimesso nell'estate del 2016. Gli successe come presidente Marc Tessier-Lavigne. Marc Andreessen lo ha definito "il padrino della Silicon Valley".

Insieme a David Patterson, Hennessy ha ricevuto il Turing Award 2017 per il lavoro svolto nello sviluppo dell'architettura RISC (ridotto di istruzioni per computer), che ora è utilizzata nel 99% dei nuovi chip per computer

Descrizione di Il libro

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities pdf da John L. Hennessy

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks

Recensione del libro

0

out of

5 stars

0

0

0

0

0

Book Quotes

Top rated
Latest
Quote
there are not any quotes

there are not any quotes

Altri libri John L. Hennessy

Computer Architecture ,A Quantitative Approach
Computer Architecture ,A Quantitative Approach
hardware
1005
English
John L. Hennessy
Computer Architecture ,A Quantitative Approach pdf da John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface
Computer Organization and Design: The Hardware,Software Interface
hardware
882
English
John L. Hennessy
Computer Organization and Design: The Hardware,Software Interface pdf da John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach
A solution manual to Computer Architecture: A Quantitative Approach
hardware
768
English
John L. Hennessy
A solution manual to Computer Architecture: A Quantitative Approach pdf da John L. Hennessy
Leading Matters: Lessons from My Journey
Leading Matters: Lessons from My Journey
hardware
828
English
John L. Hennessy
Leading Matters: Lessons from My Journey pdf da John L. Hennessy

Altri libri hardware

Practical Digital Electronics for Technicians
Practical Digital Electronics for Technicians
1550
English
Unspecified writer
Practical Digital Electronics for Technicians pdf da Unspecified writer
Fuzzy Hardware: Architectures and Applications
Fuzzy Hardware: Architectures and Applications
1135
English
Marco Russo
Fuzzy Hardware: Architectures and Applications pdf da Marco Russo
Computer Organization and Architecture
Computer Organization and Architecture
1315
English
William Stallings
Computer Organization and Architecture pdf da William Stallings

Add Comment

Authentication required

You must log in to post a comment.

Log in
There are no comments yet.