Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Examines the history of computing since World War II to elucidate the federal government's role in funding computing research, supporting the education of computer scientists and engineers, and equipping university research labs. This work contains a series of case studies in relational databases, the Internet, and theoretical computer science.
Considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This title examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government.
Presents the summary of a February, 2013 workshop convened by the Computer Science and Telecommunications Board of the National Research Council to examine precise geotargeting of public alerts and warnings using social media.
"Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's website.
The US agencies with counterterrorism programs that collect personal data should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. This book urges Congress to examine the privacy law to assess how privacy can be protected in current and future programs.
Given the growing importance of cyberspace to various aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure. This title offers a strategy for research aimed at countering cyber attacks. It also explores the nature of online threats.
Software for Dependable Systems: Sufficient Evidence?
Presents a comprehensive and multidisciplinary examination of privacy in the information age. This book focuses on 3 components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities.
Provides an examination of telecommunications research support levels, focus, time horizon in industry, an assessment of university telecommunications research, and the implications of these findings on the health of the sector. This book also includes recommendations for enhancing US telecommunications and research efforts.
Summary of a Workshop on Using Information Technology to Enhance Disaster Management (2005)
Election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. This work describes the important questions and issues that election officials, policy makers, and citizens should ask about the use of computers and information technology in the electoral process.
The Domain Name System (DNS) enables alphanumeric names and domain names to be assigned to Internet sites. Many of these names have gained economic, social, and political value, leading to conflicts over their ownership, especially names containing trademarked terms. This report presents the results of a study conducted to address these issues.
Presents a summary of workshop participants; and presentations and subsequent discussion. This report covers, among other things, the strengths and limitations of process; challenges and opportunities; experience to date; organization context; and cost-effectiveness of software engineering techniques.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.