Browse Results What Format Should I Choose?

Showing 1 through 6 of 6 results

A Cyberworm that Knows no Boundaries

by Jerry M. Sollinger Isaac R. Porche III Shawn Mckay

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

E-Vision 2002, Shaping Our Future by Reducing Energy Intensity in the U.S. Economy, Volume I

by David S. Ortiz Jerry M. Sollinger

The E-Vision 2002 Conference, held in May 2002, was sponsored by the U.S. Department of Energy as a step toward implementing a key recommendation of the Bush administration's National Energy Policy. It gathered 150 of the nation's leading energy experts to discuss ways of reducing the country's energy intensity. This volume and the additional volume enclosed on CD-ROM contain the presentations and discussions that took place at the conference, including the identification of goals and the means to achieve them. It is a key work for those involved in implementing the National Energy Policy.

Networked Forces in Stability Operations: 101st Airborne Division, 3/2 and 1/25 Stryker Brigades in Northern Iraq

by Jerry M. Sollinger John Hollywood Daniel Gonzales James Mcfadden John Dejarnette

Compares three units that conducted stability operations in the same area in northern Iraq-the 101st Airborne Division (which had only limited digital communications), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT (both equipped with digital networks) and finds that leadership, training, and tactics and procedures are just as important as networking capabilities for improving mission effectiveness in stability operations.

Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits

by David R. Frelinger Michael J. Lostumbo John Halliday Eric Peltz Derek Eaton Stacie L. Pettyjohn Victoria A. Greenfield Jerry M. Sollinger Patrick Mills Bruce R. Nardulli Stephen M. Worman Michael J. Mcnerney

This independent assessment is a comprehensive study of the strategic benefits, risks, and costs of U. S. military presence overseas. The report provides policymakers a way to evaluate the range of strategic benefits and costs that follow from revising the U. S. overseas military presence by characterizing how this presence contributes to assurance, deterrence, responsiveness, and security cooperation goals.

Redefining Information Warfare Boundaries For An Army In A Wireless World

by Christopher Paul Endy Y. Min Jerry M. Sollinger Bruce J. Held Isaac R. Porche III Michael York Chad C. Serena Elliot Axelband

The U. S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U. S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.

Sources of Weapon System Cost Growth: Analysis of 35 Major Defense Acquisition Programs

by Jerry M. Sollinger Mark V. Arena Joseph G. Bolten Robert S. Leonard Obaid Younossi

This analysis uses data from Selected Acquisition Reports to determine the causes of cost growth in 35 mature major defense acquisition programs. Four major sources of growth are identified: (1) errors in estimation and scheduling, (2) decisions by the government, (3) financial matters, and (4) miscellaneous. The analysis shows that more than two-thirds of cost growth (measured as simple averages) is caused by decisions, most of which involve quantity changes, requirements growth, and schedule changes.

Showing 1 through 6 of 6 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.