Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfängen des Verlags von 1842 erschienen sind. Der Verlag stellt mit diesem Archiv Quellen für die historische wie auch die disziplingeschichtliche Forschung zur Verfügung, die jeweils im historischen Kontext betrachtet werden müssen. Dieser Titel erschien in der Zeit vor 1945 und wird daher in seiner zeittypischen politisch-ideologischen Ausrichtung vom Verlag nicht beworben.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
"In an age of unsettling revelations from Abu Ghraib and Guantanamo Bay, scholars and the general public will be interested in the degree to which American policies and practices regarding war captives have been better or worse throughout American history. Springer presents a succinct, persuasive, and very readable answer to these questions."-Journal of Military History.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. As the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This unique work--the only of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers.
In: Political science quarterly: a nonpartisan journal devoted to the study and analysis of government, politics and international affairs ; PSQ, Band 136, Heft 2, S. 366-367