With billions of computers in existence, cyberspace, 'the virtual world created when they are con...
Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topi...
With billions of computers in existence, cyberspace, 'the virtual world created when they are con...
The Department of Defense has been successfully exploiting rapidly developing advances in informa...
'This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a...
Congressional concern with cost overruns in some major defense acquisition programs led to an inv...
Libicki et al. argue that information collection requirements and systems for counterinsurgency a...
Compares a quantitative and qualitative analysis of insurgency case studies with lessons from ins...
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly f...
What is the impact of demographics on the prospective production of military power and the causes...
In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most viole...
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program--which e...
This study explores U.S. policy options for managing cyberspace relations with China via agreemen...
The chances are growing that the United States will find itself in a crisis in cyberspace--the es...
Analyzes the costs and benefits of updating the International Classification of Diseases, 9th Rev...
As Department of Defense plans for the next-generation space systems in an increasingly challengi...
Governments spend billions to protect against terrorism. Might it help to understand what al Qaed...
Although much of the growing digital economy rests on the Internet and World Wide Web, which in t...
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting ...
This report, the second in a series, reveals insights from chief information security officers; e...
Passwords are proving less and less capable of protecting computer systems from abuse. Multifacto...
The Internet is a new battleground between governments that censor online content and those who a...
Criminal activities in cyberspace are increasingly facilitated by black markets. This report char...
Develops a framework for assessing classification decisions and uses it to conclude that classify...
In May-June 2009, RAND carried out a survey of conditions in Anbar Province, once one of Iraq's m...
The perceived shortage of cybersecurity professionals working on national security may endanger t...
This report explains the menu of actions for defending an organization against cyberattack and re...
Congressional concern with cost overruns, or breaches, in several major defense acquisition progr...
Examines the portfolio of tools funded by the State Department's Bureau of Democracy, Human Right...
'Martin Libicki updates our understanding of conflict escalation dynamics for the twenty-first ce...