The report addresses the survivability and assured availability of esential US. information infrastructures, especially when they are under various forms of information warfare attack. DAFTAR ISI: 1. INTRODUCTION 2. THE INFORMATION WARFARE THREAT AND THE MEII RESPONSE 3. VULNERABILITIES 4. RESPONSIVE SECURITY TECHNIQUES 5. IDENTIFYING SECURITY TECHNIQUES
Daftar isi: Part I The federal system Part II Constitutional limitations Part III Regulation of business Part IV Administration