Browse Results What Format Should I Choose?

Showing 1 through 16 of 16 results
Title Author Copyright Date
Aptitude for Destruction, Volume 2 Peter Chalk Kim Cragin Brian A. Jackson John C. Baker John V. Parachini 2005 09/29/11
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies Peter Chalk Kim Cragin Brian A. Jackson John V. Parachini Bruce Newsome R. Kim Cragin 2007 09/30/11
The Challenge of Domestic Intelligence in a Free Society Brian A. Jackson Agnes Gereben Schaefer Benjamin W Goldsmith Genevieve Lester Darcy Noricks 2009 08/04/13
Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement Lois M. Davis Brian A. Jackson William Schwabe 2001 09/29/11
Considering the Creation of a Domestic Intelligence Agency in the United States Cheryl Y. Marcum Brian A. Jackson Albert A. Robbert Andrew Riddile 2009 08/04/13
Emerging Threats and Security Planning Henry H. Willis David R. Frelinger Brian A. Jackson Charles J. Bushman 2009 09/30/11
Evaluating Novel Threats to the Homeland David R. Frelinger Michael J. Lostumbo Robert W. Button Brian A. Jackson 2008 08/04/13
Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations Henry H. Willis Brian A. Jackson Kay Sullivan Faith 2010 08/04/13
Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector Richard Silberglitt Brian A. Jackson Brian G. Chow John S. Hollywood Dulani Woods Joe Russo George B. Drake John S. Shaffer Mikhail Zaydman 2015 02/11/15
How Do We Know What Information Sharing Is Really Worth?: Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts Brian A. Jackson 2014 12/17/14
Protecting Emergency Responders Tom Latourrette Brian A. Jackson James T. Bartis Irene T. Brahmakulam D. J. Peterson 2002 09/29/11
Protecting Emergency Responders Volume 2 Tom Latourrette Brian A. Jackson James T. Bartis D. J. Peterson Ari Houser 2003 09/29/11
Securing America's Passenger-Rail Systems Brian A. Jackson K. Jack Riley Jeremy M. Wilson Paul Steinberg Mel Eisman 2007 09/30/11
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies Peter Chalk Sara A. Daly Kim Cragin Brian A. Jackson 2007 09/30/11
Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons David R. Frelinger Brian A. Jackson James Bonomo Giacomo Bergamo 2007 09/30/11
Understanding the Role of Deterrence in Counterterrorism Security Brian A. Jackson Andrew R. Morral 2009 08/05/13
Showing 1 through 16 of 16 results


Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.