Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts ...Lees meer
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...Lees meer
Acquiring and deploying space systems in a timely, affordable manner is important to U.S. national security but for years, Department of Defense (DoD)...Lees meer
A RAND study analyzed Chinese and U.S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends ...Lees meer
The contributors to this text examine the constraints, facilitators, and potential options for Chinese responses to US transformation efforts and offe...Lees meer
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions:...Lees meer
The Global Force Management Data Initiative was launched to improve aggregation of unclassified force-structure data. Aggregation, though, raised conc...Lees meer
Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow com...Lees meer
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts coun...Lees meer
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected, ' is said to be the new medium of power. Comp...Lees meer
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very peop...Lees meer
Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book ...Lees meer
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, re...Lees meer
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cybersp...Lees meer
The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share in...Lees meer
This report examines the portfolio of tools funded by the State Department's Bureau of Democracy, Human Rights, and Labor that help support Internet f...Lees meer
Analyzes the cost and benefits of updating the International Classification of Diseases. 9th Revision codes for diagonses and procedures to their ICD-...Lees meer
What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projec...Lees meer
Congressional concern with cost overruns, or breaches of Nunn-McCurdy thresholds, in several major defense acquisition programs led the authors, in a ...Lees meer
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or stat...Lees meer
In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most violent areas. The resulting data on demographics, employm...Lees meer
Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Perfor...Lees meer
Cybersecurity professionals are faced with the dilemma of selecting from a large set of cybersecurity defensive measures while operating with a limite...Lees meer