Libicki, Martin C.
Libicki, Martin C., 1952-....
ليبيكي، مارتن سي.، 1952-
Libicki, Martin (1952- )
Libicki, M. C.
Libicki, Martin C., cyber security
Martin C. Libicki americký ekonom, též práce o informačních technologiích a informační bezpečnosti
VIAF ID: 2566501 (Personal)
Permalink: http://viaf.org/viaf/2566501
Preferred Forms
-
- 200 _ | ‡a Libicki ‡b Martin C. ‡f 1952-....
- 100 1 _ ‡a Libicki, M. C.
-
- 100 1 _ ‡a Libicki, Martin C.
-
-
- 100 1 _ ‡a Libicki, Martin C.
- 100 1 _ ‡a Libicki, Martin C.
-
- 100 1 _ ‡a Libicki, Martin C. ‡d 1952-
-
-
-
-
- 100 1 _ ‡a Libicki, Martin C., ‡d 1952-....
-
- 100 0 _ ‡a Martin C. Libicki ‡c americký ekonom, též práce o informačních technologiích a informační bezpečnosti
-
-
4xx's: Alternate Name Forms (13)
5xx's: Related Names (2)
- 510 2 _ ‡a Pardee Rand Graduate School ‡g Santa Monica, Calif. ‡4 affi ‡4 http://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
- 510 2 _ ‡a United States Naval Academy ‡g Annapolis, Md. ‡4 affi ‡4 http://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
Works
Title | Sources |
---|---|
Assessing living conditions in Iraq's Anbar Province in 2009 | |
Brandishing cyberattack capabilities | |
Byting back : regaining information superiority against 21st-century insurgents | |
The common byte, or, Why excellent information technology standards are both absolutely essential and utterly impossible : summary version | |
Cyber warfare and Sino-American crisis instability | |
Cyberdeterrence and cyberwar | |
Cyberspace in peace and war | |
The defender's dilemma : charting a course toward cybersecurity | |
Defending cyberspace, and other metaphors | |
Dominant battlespace knowledge : the winning edge | |
Exploring terrorist targeting preferences | |
A Framework for Programming and Budgeting for Cybersecurity | |
Getting to yes with China in cyberspace | |
Global demographic change and its implications for military power | |
Hackers wanted : an examination of the cybersecurity labor market | |
How insurgencies end | |
How terrorist groups end : lessons for countering Al Qa'ida | |
Illuminating tomorrow's war | |
Industrial strength defense | |
Influences on the adoption of multifactor authentication | |
The intersystem, or the RMA reified | |
Markets for cybercrime tools and stolen data : hackers' bazaar | |
The mesh and the net, 1994: | |
Mind the gap : promoting a transatlantic revolution in military affers / by David C. Gompert, Richard L. Kugler and Martin C. Libicki. - Washington, D. C., 1999. | |
The new calculus of escalation : avoiding armageddon in great power conflict | |
New challenges, new tools for defense decisionmaking | |
Problem formulation and solution elements | |
Ramifications of DARPA's Programming Computation on Encrypted Data Program | |
Rozmowa z dr. Martinem C. Libickim ekspertem ds. bezpieczeństwa | |
Scaffolding the new Web, 2000: | |
Standards: the rough road to the common byte | |
What is information warfare? | |
What makes industries strategic : a perspective on technology, economic development, and defense | |
What should be classified? : a framework with application to the Global Force Management Data Initiative | |
التلويح بقدرات الهجوم عبر الإنترنت | |
情報戰이란 무엇인가? |