Browse Results What Download Format Should I Choose?

Showing 1 through 6 of 6 results

A Cyberworm that Knows no Boundaries

by Shawn Mckay Jerry M. Sollinger Isaac R. Porche III

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

E-Vision 2002, Shaping Our Future by Reducing Energy Intensity in the U.S. Economy, Volume I

by Jerry M. Sollinger David S. Ortiz

The E-Vision 2002 Conference, held in May 2002, was sponsored by the U.S. Department of Energy as a step toward implementing a key recommendation of the Bush administration's National Energy Policy. It gathered 150 of the nation's leading energy experts to discuss ways of reducing the country's energy intensity. This volume and the additional volume enclosed on CD-ROM contain the presentations and discussions that took place at the conference, including the identification of goals and the means to achieve them. It is a key work for those involved in implementing the National Energy Policy.

Networked Forces in Stability Operations: 101st Airborne Division, 3/2 and 1/25 Stryker Brigades in Northern Iraq

by John Hollywood Daniel Gonzales James Mcfadden John Dejarnette Jerry M. Sollinger

Compares three units that conducted stability operations in the same area in northern Iraq-the 101st Airborne Division (which had only limited digital communications), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT (both equipped with digital networks) and finds that leadership, training, and tactics and procedures are just as important as networking capabilities for improving mission effectiveness in stability operations.

Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits

by Michael J. Lostumbo Michael J. Mcnerney Eric Peltz Derek Eaton David R. Frelinger Victoria A. Greenfield John Halliday Patrick Mills Bruce R. Nardulli Stacie L. Pettyjohn Jerry M. Sollinger Stephen M. Worman

This independent assessment is a comprehensive study of the strategic benefits, risks, and costs of U. S. military presence overseas. The report provides policymakers a way to evaluate the range of strategic benefits and costs that follow from revising the U. S. overseas military presence by characterizing how this presence contributes to assurance, deterrence, responsiveness, and security cooperation goals.

Redefining Information Warfare Boundaries For An Army In A Wireless World

by Bruce J. Held Endy Y. Min Elliot Axelband Jerry M. Sollinger Chad C. Serena Michael York Christopher Paul Isaac R. Porche III

The U. S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U. S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.

Sources of Weapon System Cost Growth: Analysis of 35 Major Defense Acquisition Programs

by Jerry M. Sollinger Mark V. Arena Joseph G. Bolten Robert S. Leonard Obaid Younossi

This analysis uses data from Selected Acquisition Reports to determine the causes of cost growth in 35 mature major defense acquisition programs. Four major sources of growth are identified: (1) errors in estimation and scheduling, (2) decisions by the government, (3) financial matters, and (4) miscellaneous. The analysis shows that more than two-thirds of cost growth (measured as simple averages) is caused by decisions, most of which involve quantity changes, requirements growth, and schedule changes.

Showing 1 through 6 of 6 results

Help

Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.

See and hear words read aloud
  • DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
  • DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
  • Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
Listen to books with audio only
  • DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
  • MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
Read in Braille
  • BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
  • DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
  • Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.