Browse Results What Format Should I Choose?

Showing 1 through 4 of 4 results

A Cyberworm that Knows no Boundaries

by Jerry M. Sollinger Isaac R. Porche III Shawn Mckay

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

data_flood: Helping the Navy Address the Rising Tide of Sensor Information

by Bradley Wilson Isaac R. Porche III Evan Saltzman Erin-Elizabeth Johnson Shane Tierney

Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data" challenge, considering changes across four dimensions: people, tools and technology, data and data architectures, and demand and demand management.

The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

by Christopher Paul Isaac R. Porche III Elliot Axelband

With the establishment of U. S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U. S. cyber force and early U. S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U. S. cyber forces.

Redefining Information Warfare Boundaries For An Army In A Wireless World

by Christopher Paul Endy Y. Min Jerry M. Sollinger Bruce J. Held Isaac R. Porche III Michael York Chad C. Serena Elliot Axelband

The U. S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U. S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.

Showing 1 through 4 of 4 results


Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.