Government Reports Annual Index

Government Reports Annual Index

Author:

Publisher:

Published: 1995

Total Pages: 1686

ISBN-13:

DOWNLOAD EBOOK

Sections 1-2. Keyword Index.--Section 3. Personal author index.--Section 4. Corporate author index.-- Section 5. Contract/grant number index, NTIS order/report number index 1-E.--Section 6. NTIS order/report number index F-Z.


Realizing the Potential of C4I

Realizing the Potential of C4I

Author: National Research Council

Publisher: National Academies Press

Published: 1999-06-17

Total Pages: 299

ISBN-13: 0309064856

DOWNLOAD EBOOK

Rapid progress in information and communications technologies is dramatically enhancing the strategic role of information, positioning effective exploitation of these technology advances as a critical success factor in military affairs. These technology advances are drivers and enablers for the "nervous system" of the militaryâ€"its command, control, communications, computers, and intelligence (C4I) systemsâ€"to more effectively use the "muscle" side of the military. Authored by a committee of experts drawn equally from the military and commercial sectors, Realizing the Potential of C4I identifies three major areas as fundamental challenges to the full Department of Defense (DOD) exploitation of C4I technologyâ€"information systems security, interoperability, and various aspects of DOD process and culture. The book details principles by which to assess DOD efforts in these areas over the long term and provides specific, more immediately actionable recommendations. Although DOD is the focus of this book, the principles and issues presented are also relevant to interoperability, architecture, and security challenges faced by government as a whole and by large, complex public and private enterprises across the economy.


The Art of Systems Architecting

The Art of Systems Architecting

Author: Mark W. Maier

Publisher: CRC Press

Published: 2009-01-06

Total Pages: 319

ISBN-13: 104007930X

DOWNLOAD EBOOK

If engineering is the art and science of technical problem solving, systems architecting happens when you don't yet know what the problem is. The third edition of a highly respected bestseller, The Art of Systems Architecting provides in-depth coverage of the least understood part of systems design: moving from a vague concept and limited resources


At the Nexus of Cybersecurity and Public Policy

At the Nexus of Cybersecurity and Public Policy

Author: National Research Council

Publisher: National Academies Press

Published: 2014-06-16

Total Pages: 170

ISBN-13: 0309303214

DOWNLOAD EBOOK

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.


The Transformation of the Armed Forces

The Transformation of the Armed Forces

Author: Michele Nones

Publisher: Edizioni Nuova Cultura

Published: 2012

Total Pages: 176

ISBN-13: 8861348793

DOWNLOAD EBOOK

Information technology (IT) has had, and will continue to have, a deep impact on the defence sector. The most advanced countries, not only the U.S. but also France, Great Britain and Italy, over the past few years have undergone a transormation of their armed forces aimed at exploiting the strategic advantages of IT. The goal pursued in Europe, and also promoted by NATO, is Network Enabled Capability (NEC). That is combining equipment and soldiers, as well as different doctrinal, procedural, technical and organizational elements, into a single network to obtain their interaction in order to achieve substantial strategic superiority. In practice, this also occurs with a strong, efficient and secure telecommunications network, and through netcentric modernization of armed forces' capability and systems aimed at connecting them to the net. This research paper analyzes the military netcentric modernization and transformation programs - still in progress - in France, Britain and Italy, with special focus on the joint program led by the Italian army called "Forza NEC". Opportunities and challenges of "Forza NEC" have been considered according to the Italian armed force's requirements, developed during two decades of experience in international military operations, as well as in the light of the evolution of strategic doctrine at a European and transatlantic level. Particular attention has been devoted to the interaction between industry and the armed forces, and to the involvement of many Italian companies in different "Forza NEC" activities, as it represents one of the pillars of the procurement program.


Finding and Fixing Vulnerabilities in Information Systems

Finding and Fixing Vulnerabilities in Information Systems

Author: Philip S. Anton

Publisher: Rand Corporation

Published: 2004-02-09

Total Pages: 145

ISBN-13: 0833035991

DOWNLOAD EBOOK

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.


The World Wide Military Command and Control System evolution and effectiveness

The World Wide Military Command and Control System evolution and effectiveness

Author: David Eric Pearson

Publisher: DIANE Publishing

Published: 2000

Total Pages: 389

ISBN-13: 1428990860

DOWNLOAD EBOOK

Perhaps the best single way to summarize it is to view the book as a bureaucratic or organizational history. What the author does is to take three distinct historical themes-organization, technology, and ideology and examine how each contributed to the development of WWMCCS and its ability (and frequent inability) to satisfy the demands of national leadership. Whereas earlier works were primarily descriptive, cataloguing the command and control assets then in place or under development, The book offers more analysis by focusing on the issue of how and why WWMCCS developed the way it did. While at first glance less provocative, this approach is potentially more useful for defense decision makers dealing with complex human and technological systems in the post-cold-war era. It also makes for a better story and, I trust, a more interesting read. By necessity, this work is selective. The elements of WWMCCS are so numerous, and the parameters of the system potentially so expansive, that a full treatment is impossible within the compass of a single volume. Indeed, a full treatment of even a single WWMCCS asset or subsystem-the Defense Satellite Communications System, Extremely Low Frequency Communications, the National Military Command System, to name but a few-could itself constitute a substantial work. In its broadest conceptualization, WWMCCS is the world, and my approach has been to deal with the head of the octopus rather than its myriad tentacles.


Navy Planning, Programming, Budgeting, and Execution

Navy Planning, Programming, Budgeting, and Execution

Author: Irv Blickstein

Publisher:

Published: 2016

Total Pages: 0

ISBN-13: 9780833096142

DOWNLOAD EBOOK

This tool documents key but enduring aspects of how the Navy implements the Planning, Programming, Budgeting, and Execution process so that action officers and Navy leaders can successfully navigate and effectively contribute to the process.


U.S. Navy Program Guide - 2017

U.S. Navy Program Guide - 2017

Author: Department Of the Navy

Publisher: Independently Published

Published: 2019-03-12

Total Pages: 204

ISBN-13: 9781090335104

DOWNLOAD EBOOK

The U.S. Navy is ready to execute the Nation's tasks at sea, from prompt and sustained combat operations to every-day forward-presence, diplomacy and relief efforts. We operate worldwide, in space, cyberspace, and throughout the maritime domain. The United States is and will remain a maritime nation, and our security and prosperity are inextricably linked to our ability to operate naval forces on, under and above the seas and oceans of the world. To that end, the Navy executes programs that enable our Sailors, Marines, civilians, and forces to meet existing and emerging challenges at sea with confidence. Six priorities guide today's planning, programming, and budgeting decisions: (1) maintain a credible, modern, and survivable sea based strategic deterrent; (2) sustain forward presence, distributed globally in places that matter; (3) develop the capability and capacity to win decisively; (4) focus on critical afloat and ashore readiness to ensure the Navy is adequately funded and ready; (5) enhance the Navy's asymmetric capabilities in the physical domains as well as in cyberspace and the electromagnetic spectrum; and (6) sustain a relevant industrial base, particularly in shipbuilding.