Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...Savoir plus
RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts ...Savoir plus
Acquiring and deploying space systems in a timely, affordable manner is important to U.S. national security but for years, Department of Defense (DoD)...Savoir plus
Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book ...Savoir plus
The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share in...Savoir plus
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions:...Savoir plus
Analyzes the cost and benefits of updating the International Classification of Diseases. 9th Revision codes for diagonses and procedures to their ICD-...Savoir plus
The Global Force Management Data Initiative was launched to improve aggregation of unclassified force-structure data. Aggregation, though, raised conc...Savoir plus
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or stat...Savoir plus
Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow com...Savoir plus
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts coun...Savoir plus
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...Savoir plus
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very peop...Savoir plus
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, re...Savoir plus
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cybersp...Savoir plus
A RAND study analyzed Chinese and U.S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends ...Savoir plus
This report examines the portfolio of tools funded by the State Department's Bureau of Democracy, Human Rights, and Labor that help support Internet f...Savoir plus
As the need to identify known and suspected combatants has elevated the importance of biometrics in the Department of Defense (DoD), RAND researchers ...Savoir plus
All terrorist groups eventually end. But how? Most modern groups have ended because they joined the political process or local police and intelligence...Savoir plus
What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projec...Savoir plus
Congressional concern with cost overruns, or breaches of Nunn-McCurdy thresholds, in several major defense acquisition programs led the authors, in a ...Savoir plus
In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most violent areas. The resulting data on demographics, employm...Savoir plus
Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Perfor...Savoir plus