Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007414881/catalog> ?p ?o. }
Showing items 1 to 29 of
29
with 100 items per page.
- catalog abstract "In recent years, a RAND-developed "The Day After ..." exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW). On March 23, 1996, a "The Day After ... in Cyberspace" exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices, under the sponsorship of the Defense Advanced Research Projects Agency. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the security of the U.S. information infrastructure. The scenario in the exercise involved a Mideast crisis situation, with Iran as an aggressor. Exercise participants discussed both short-term technical fixes to counter IW attacks that were hypothesized to occur in the year 2000 and longer-term research strategies that could be initiated now to avoid significant vulnerabilities in the future.".
- catalog contributor b10235256.
- catalog contributor b10235257.
- catalog contributor b10235258.
- catalog contributor b10235259.
- catalog contributor b10235260.
- catalog created "1996.".
- catalog date "1996".
- catalog date "1996.".
- catalog dateCopyrighted "1996.".
- catalog description "In recent years, a RAND-developed "The Day After ..." exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW). On March 23, 1996, a "The Day After ... in Cyberspace" exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices, under the sponsorship of the Defense Advanced Research Projects Agency. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the security of the U.S. information infrastructure. The scenario in the exercise involved a Mideast crisis situation, with Iran as an aggressor. Exercise participants discussed both short-term technical fixes to counter IW attacks that were hypothesized to occur in the year 2000 and longer-term research strategies that could be initiated now to avoid significant vulnerabilities in the future.".
- catalog description "Includes bibliographical references (p. 67).".
- catalog extent "xv, 67 p. :".
- catalog hasFormat "Exploration of cyberspace security R & D investment strategies for DARPA.".
- catalog identifier "0833024523 (alk. paper)".
- catalog isFormatOf "Exploration of cyberspace security R & D investment strategies for DARPA.".
- catalog issued "1996".
- catalog issued "1996.".
- catalog language "eng".
- catalog publisher "Santa Monica, CA : Rand,".
- catalog relation "Exploration of cyberspace security R & D investment strategies for DARPA.".
- catalog spatial "United States.".
- catalog subject "355.3/43 20".
- catalog subject "Computer networks Security measures Government policy United States.".
- catalog subject "Computer security Government policy United States.".
- catalog subject "Information superhighway Research Government policy United States.".
- catalog subject "QA76.9.A25 A53 1996".
- catalog title "An exploration of cyberspace security R&D investment strategies for DARPA : "the day after...in cyberspace II" / Robert H. Anderson, Anthony C. Hearn.".
- catalog type "text".