Are US and Chinese Cyber Intrusions So Different? Both the U.S. and China have been linked to cyber snooping. How different are their activities?
MetadataShow full item record
Showing items related by title, author, creator and subject.
Achieving Better Buying Power for Mobile Open Architecture Software Systems through Diverse Acquisition Scenarios Scacchi, Walt; Alspaugh, Thomas A. (Monterey, California. Naval Postgraduate School, 2017-05); UCI-AM-17-041This research seeks to identify, track, and analyze software component costs and cost reduction opportunities within diverse acquisition life cycle scenarios for open architecture systems accommodating Web-based and mobile ...
Falby, Naomi; Thompson, Michael F.; Irvine, Cynthia E. (IEEE, 2004-06-00);The Center for the Information Systems Studies and Research (CISR) at the Naval Postgraduate School has established a broad program in computer and network security education. The program, founded on a core in traditional ...
Nguyen, Thuy D.; Gondree, Mark A.; Khosalim, Jean; Irvine, Cynthia E. (2013);The Apache™ Hadoop® framework provides parallel processing and distributed data storage capabilities that data analytics applications can utilize to process massive sets of raw data. These Big Data applications ...