Using the acquisition process to reduce the vulnerability of future systems to information warfare - Info and Reading Options
By William S. Mullis

"Using the acquisition process to reduce the vulnerability of future systems to information warfare" was published by Naval Postgraduate School in 1997 - Monterey, Calif, it has 68 pages and the language of the book is English.
“Using the acquisition process to reduce the vulnerability of future systems to information warfare” Metadata:
- Title: ➤ Using the acquisition process to reduce the vulnerability of future systems to information warfare
- Author: William S. Mullis
- Language: English
- Number of Pages: 68
- Publisher: Naval Postgraduate School
- Publish Date: 1997
- Publish Location: Monterey, Calif
“Using the acquisition process to reduce the vulnerability of future systems to information warfare” Subjects and Themes:
- Subjects: DEFENSE SYSTEMS - ARMY - ACQUISITION - INFORMATION WARFARE
Edition Specifications:
- Pagination: ix, 68 p. ;
Edition Identifiers:
- The Open Library ID: OL25310398M - OL16630103W
- Online Computer Library Center (OCLC) ID: 640487615
AI-generated Review of “Using the acquisition process to reduce the vulnerability of future systems to information warfare”:
"Using the acquisition process to reduce the vulnerability of future systems to information warfare" Description:
The Open Library:
Information warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW.
Read “Using the acquisition process to reduce the vulnerability of future systems to information warfare”:
Read “Using the acquisition process to reduce the vulnerability of future systems to information warfare” by choosing from the options below.
Search for “Using the acquisition process to reduce the vulnerability of future systems to information warfare” downloads:
Visit our Downloads Search page to see if downloads are available.
Borrow "Using the acquisition process to reduce the vulnerability of future systems to information warfare" Online:
Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.
- Is Online Borrowing Available: Yes
- Preview Status: full
- Check if available: The Open Library & The Internet Archive
Find “Using the acquisition process to reduce the vulnerability of future systems to information warfare” in Libraries Near You:
Read or borrow “Using the acquisition process to reduce the vulnerability of future systems to information warfare” from your local library.
Buy “Using the acquisition process to reduce the vulnerability of future systems to information warfare” online:
Shop for “Using the acquisition process to reduce the vulnerability of future systems to information warfare” on popular online marketplaces.
- Ebay: New and used books.