"Using the acquisition process to reduce the vulnerability of future systems to information warfare" - Information and Links:

Using the acquisition process to reduce the vulnerability of future systems to information warfare - Info and Reading Options

Book's cover
The cover of “Using the acquisition process to reduce the vulnerability of future systems to information warfare” - Open Library.

"Using the acquisition process to reduce the vulnerability of future systems to information warfare" was published by Naval Postgraduate School in 1997 - Monterey, Calif, it has 68 pages and the language of the book is English.


“Using the acquisition process to reduce the vulnerability of future systems to information warfare” Metadata:

  • Title: ➤  Using the acquisition process to reduce the vulnerability of future systems to information warfare
  • Author:
  • Language: English
  • Number of Pages: 68
  • Publisher: Naval Postgraduate School
  • Publish Date:
  • Publish Location: Monterey, Calif

“Using the acquisition process to reduce the vulnerability of future systems to information warfare” Subjects and Themes:

Edition Specifications:

  • Pagination: ix, 68 p. ;

Edition Identifiers:

AI-generated Review of “Using the acquisition process to reduce the vulnerability of future systems to information warfare”:


"Using the acquisition process to reduce the vulnerability of future systems to information warfare" Description:

The Open Library:

Information warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW.

Read “Using the acquisition process to reduce the vulnerability of future systems to information warfare”:

Read “Using the acquisition process to reduce the vulnerability of future systems to information warfare” by choosing from the options below.

Search for “Using the acquisition process to reduce the vulnerability of future systems to information warfare” downloads:

Visit our Downloads Search page to see if downloads are available.

Borrow "Using the acquisition process to reduce the vulnerability of future systems to information warfare" Online:

Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.

Find “Using the acquisition process to reduce the vulnerability of future systems to information warfare” in Libraries Near You:

Read or borrow “Using the acquisition process to reduce the vulnerability of future systems to information warfare” from your local library.

Buy “Using the acquisition process to reduce the vulnerability of future systems to information warfare” online:

Shop for “Using the acquisition process to reduce the vulnerability of future systems to information warfare” on popular online marketplaces.


Related Books

Related Ebooks

Source: The Open Library

E-Books

Related Ebooks from the Open Library and The Internet Archive.

1Using the acquisition process to reduce the vulnerability of future systems to information warfare - Ebook

Book's cover

Please note that the files availability may be limited due to copyright restrictions.
Check the files availability here, with more info and coverage.

“Using the acquisition process to reduce the vulnerability of future systems to information warfare - Ebook” Metadata:

  • Title: ➤  Using the acquisition process to reduce the vulnerability of future systems to information warfare - Ebook
  • Publish Date:

Edition Identifiers:


Find "Using The Acquisition Process To Reduce The Vulnerability Of Future Systems To Information Warfare" in Wikipdedia