This report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term.
Use the following url to access the free ebook Information Technology for Counterterrorism .
http://www.nap.edu/catalog/10640.html
No comments:
Post a Comment