Browse All Reviews
Computer Applications (J)
Administrative Data Processing (J.1)
> Military (J.1...)
All Media Types
1-10 of 25 Reviews about "
Sandworm: a new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers
Greenberg A., Doubleday, New York, NY, 2019. 368 pp. Type: Book (978-0-385544-40-5)
“Digital security” has been a buzzword of the past decades. The vulnerabilities grow as fast as the digital networks and systems, or rather faster--all new technologies add to the long list of possible means and/or targets for hac...
May 26 2021
Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)
A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state actors” a...
Jul 16 2020
Waging cyber war: technical challenges and operational constraints
Oakley J., Apress, New York, NY, 2019. 212 pp. Type: Book (978-1-484249-49-9)
The general population as well as industry and government are largely aware of the cyber threat risks to personal computers (PCs), smartphones, intelligent devices, servers, and networks. Attacks and hackers have hit all of these, exploiting many ...
May 15 2020
Research on LRU optimal division method considering comprehensive cost of development and maintenance
Ge Z., Jiang S., luo X., Qi Z., Yang Y., Zhang Y. CSAE 2019 (Proceedings of the 3rd International Conference on Computer Science and Application Engineering, Sanya, China, Oct 22-24, 2019) 1-7, 2019. Type: Proceedings
Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance costs and high availability, but can also be a big challenge “under battlefield conditions.” One ...
Jan 17 2020
Security and defence in Europe
Ramirez J., Biziewski J., Springer International Publishing, New York, NY, 2020. 264 pp. Type: Book (978-3-030122-92-8)
OK, so it’s another book on security, cyberwarfare, the danger of ..., and the need for an effective and affective defense. But from the first sentence of the excellent prologue, written by Ana Palacio, former Foreign Affairs Minister of Spa...
Nov 18 2019
Metaheuristic approaches to the placement of suicide bomber detectors
Cotta C., Gallardo J. Journal of Heuristics 24(3): 483-513, 2018. Type: Article
This paper considers the problem of placing suicide bomber detectors. The model takes into account the probability that a given detector may fail to detect bombers. In brief, the model assumes a layout of squares, some of which are blocked and som...
Aug 6 2018
Conflict and complexity: countering terrorism, insurgency, ethnic and regional violence
Fellman P., Bar-Yam Y., Minai A., Springer International Publishing, New York, NY, 2015. 292 pp. Type: Book (978-1-493917-04-4)
The 32 authors who have contributed to this book’s 16 chapters include military experts, political scientists, psychologists, economists, sociologists, and complexity scientists. Their objective is to show how concepts from the sciences of c...
Aug 15 2017
Unmanned systems of World Wars I and II
Everett H., The MIT Press, Cambridge, MA, 2015. 768 pp. Type: Book (978-0-262029-22-3)
The first time I heard of H. R. Everett was in Singer’s
Wired for war
, on the subject of unmanned systems on the battlefield: “When I asked people who they most respected in the field, the name that consistently came up was ...
Jul 25 2017
Cognitive radio as the facilitator for advanced communications electronic warfare solutions
Dabcevic K., Mughal M., Marcenaro L., Regazzoni C. Journal of Signal Processing Systems 83(1): 29-44, 2016. Type: Article
Software-defined radio (SDR) based cognitive radio (CR), which provides the surveillance and utilization of a wide range of frequencies without pre-defined spectral channels, creates new functional possibilities in military and nonmilitary use cas...
May 5 2017
Codes, ciphers and spies: tales of military intelligence in World War I
Dooley J., Copernicus, New York, NY, 2016. 280 pp. Type: Book (978-3-319294-14-8)
The invention of asymmetric key cryptography by Diffie and Hellman in 1976  is generally accepted as the milestone that defines the boundary between classic and modern cryptography. Before 1976, cryptography was more of an art than a science, b...
Oct 27 2016
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.