PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
NEXT
eBooks
PRELIMINARY OBSERVATIONS ON DOD SOFTWARE RESEARCH NEEDS AND PRIORITIES: A LETTER REPORT  

The Committee on Advancing Software-Intensive Systems Producibility was appointed by the National Research Council (NRC) and convened under the auspices of the NRCs Computer Science and Telecommunications Board (CSTB) to assess the nature of the national investment in software research and, in ...Read more >

33 Pages
776.30 KB
SCIENCE AND TECHNOLOGY TO COUNTER TERRORISM  

The scientific and research policies of the U.S. government were profoundly transformed by the cold war in response to a military strategy of technological superiority. Only the shock of the September 11, 2001, attack on the World Trade Center, the Pentagon, and one other unknown target forced a restructuring to meet the threat of catastrophic ...Read more >

181 Pages
1.38 MB
REVIEW OF DIRECTED ENERGY TECHNOLOGY FOR COUNTERING ROCKETS, ARTILLERY AND MORTARS  

This study report was prepared by the National Research Councils Committee on Directed Energy Technology for Countering Indirect Weapons. The report provides results of the committees assessments and committee recommendations concerning the U.S. Armys efforts to develop and demonstrate ...Read more >

43 Pages
474.88 KB
SCIENCE AND TECHNOLOGY FOR ARMY HOMELAND SECURITY  

The U.S. Army is facing a challenge. At the same time that it launches a transformation toward the futuristic Objective Force, the centuries-old requirement to support civil authorities has been brought to the fore by the terrorist attacks of September 11, ...Read more >

185 Pages
1.77 MB
THE TELECOMMUNICATIONS CHALLENGE  

The New Economy refers to a fundamental transformation in the United States economy as businesses and individuals capitalize on new technologies, new opportunities, and national investments in computing, information, and ...Read more >

219 Pages
1.58 MB
TOWARD A SAFER AND MORE SECURE CYBERSPACE  

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure ...Read more >

329 Pages
2.16 MB
TECHNOLOGY, POLICY, LAW AND ETHICS REGARDING U.S. ACQUISITION AND USE OF CYBERATTACK CAPABILITIES  

Cyberattack can support military operations. For example, a cyberattack could disrupt adversary command, control, and communications; suppress air defenses; degrade smart munitions and platforms; or attack war-fighting or war-making ...Read more >

323 Pages
1.77 MB
NO EASY DAY : THE FIRSTHAND ACCOUNT OF THE MISSION THAT KILLED OSAMA BIN LADEN   

No Easy Day is the story of the guys, the human toll we pay, and the sacrifices we make to do this dirty job. This book is about a brotherhood that existed long before I joined and will be around long after I am ...Read more >

173 Pages
1.77 MB
MAO TSE-TUNG ON GUERRILLA WARFARE  

At one end of the Spectrum, ranks of electronic boxes buried deep in the earth hungrily consume data and spew out endless ...Read more >

128 Pages
989.43 KB
DEMOCRATIZATION IN THE ARAB WORLD  

The successful revolts in early 2011 against long-entrenched autocrats in Egypt and Tunisia were a remarkable human achievement. By the end of 2011, Tunisia had crossed the threshold to becoming an ...Read more >

439 Pages
1.84 MB
ARMY HANDBOOK FOR SELF DEVELOPMENT  

The Army accomplishes a wide array of missions in diverse and unusual circumstances around the world. At the same time, the Army is engaged in a massive and accelerated transformation that will infuse new organizations, technologies, and capabilities throughout the Army. To meet the recurring challenges, Army personnel must supplement institutional and organizational training and education with continuous, planned ...Read more >

29 Pages
4.94 MB
TIBET AND INDIAS SECURITY  

As regards Sino-Tibetan relations, the status of Tibet is at the core of the dispute. China maintains that Tibet is an inalienable part of China. Tibetans maintain that Tibet has historically been an independent country. In reality, the conflict over Tibetís status has been a conflict over ...Read more >

214 Pages
3.27 MB
MILITARY A REVISED DIGEST OF AIRPOWER OPINIONS AND THOUGHTS   

Every art has its rules and maxims. One must study them: theory facilitates practice. The lifetime of one man is not long enough to enable him to acquire perfect knowledge and experience. Theory helps to supplement it; it provides a youth with premature experience and makes him skillful also through the mistakes of others. In the profession of war the rules of the art are never violated without drawing punishment from the enemy, who is delighted to find us at ...Read more >

277 Pages
4.78 MB
THE BATTLES FOR ABU AGELIA IN THE 1956 AND 1967 ARAB-ISRAELI WARS  

Between the 1956 and 1967 wars, the Israel Defense Forces (IDF) underwent a professionalization and maturation that culminated in the brilliant victory of the Six Day War. In 1956, the IDF had failed to defeat decisively the Egyptian Army in battle: the Egyptians withdrew from the Sinai only after the British and French had commenced their bombardment of Egyptian airfields in support of Israeli operations. Eleven years later, however, the Israelis single-handedly defeated the combined armed ...Read more >

150 Pages
38.3 MB
INFORMATION AGE TRANSFORMATION GETTING TO A 21ST CENTURY MILITARY   

Military organizations are, by their very nature, resistant to change. This is in no small part due to the fact that the cost of error is exceedingly high. Change, particularly change that may affect the relationships among organizations and between commanders and their subordinates, presents significant risks and therefore generates considerable concern. The explosion of information technologies has set in motion a virtual tidal wave of change that is in the process of profoundly affecting ...Read more >

155 Pages
1.26 MB
PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
NEXT