skip to content
An exploration of cyberspace security R&D investment strategies for DARPA : Preview this item
ClosePreview this item
Checking...

An exploration of cyberspace security R&D investment strategies for DARPA : "the day after-- in cyberspace II"

Author: Robert H Anderson; Anthony C Hearn; United States. Defense Advanced Research Projects Agency.; National Defense Research Institute (U.S.); Rand Corporation.
Publisher: Santa Monica, CA : Rand, 1996.
Edition/Format:   Book : EnglishView all editions and formats
Database:WorldCat
Summary:
In recent years, a RAND-developed "The Day After..." exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW). On March 23, 1996, a "The Day After...in Cyberspace" exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Anderson, Robert H. (Robert Helms), 1939-
Exploration of cyberspace security R&D investment strategies for DARPA.
Santa Monica, CA : Rand, 1996
(OCoLC)763168939
Document Type: Book
All Authors / Contributors: Robert H Anderson; Anthony C Hearn; United States. Defense Advanced Research Projects Agency.; National Defense Research Institute (U.S.); Rand Corporation.
ISBN: 0833024523 9780833024527
OCLC Number: 35450432
Notes: "National Defense Research Institute."
"Prepared for the Defense Advanced Research Projects Agency."
At head of title: Rand.
Description: xv, 67 p. : ill. ; 28 cm.
Responsibility: Robert H. Anderson, Anthony C. Hearn.

Abstract:

On March 23, 1996, a The Day After...in Cyberspace exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices. The purpose was to generate suggestions and options  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/35450432>
library:oclcnum"35450432"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/35450432>
rdf:typeschema:Book
schema:about
<http://id.loc.gov/authorities/subjects/sh2009121189>
rdf:typeschema:Intangible
schema:name"Computer security--Government policy--United States."@en
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872344>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures--Government policy"@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:contributor
<http://viaf.org/viaf/132454617>
rdf:typeschema:Organization
schema:name"United States. Defense Advanced Research Projects Agency."
schema:contributor
schema:contributor
<http://viaf.org/viaf/139691881>
rdf:typeschema:Organization
schema:name"National Defense Research Institute (U.S.)"
schema:contributor
schema:creator
schema:datePublished"1996"
schema:description"In recent years, a RAND-developed "The Day After..." exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW). On March 23, 1996, a "The Day After...in Cyberspace" exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices, under the sponsorship of the Defense Advanced Research Projects Agency. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the security of the U.S. information infrastructure. The scenario in the exercise involved a Mideast crisis situation, with Iran as an aggressor. Exercise participants discussed both short-term technical fixes to counter IW attacks that were hypothesized to occur in the year 2000 and longer-term research strategies that could be initiated now to avoid significant vulnerabilities in the future."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1052964333>
schema:inLanguage"en"
schema:name"An exploration of cyberspace security R&D investment strategies for DARPA : "the day after-- in cyberspace II""@en
schema:numberOfPages"67"
schema:publisher
schema:url
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.