Search results

RSS feed for this result

4 results

Book
1 electronic document (21p.) : digital, PDF file
"This paper is intended to sound a warning - to raise awareness about the state of our ground forces today and the very real risk that poses to our future security. This paper also proposes an action plan for restoring the health and vitality of the U.S. military"--P. 1.
SAL3 (off-campus storage)
Book
xxii, 116 p. : col. ill. ; 26 cm.
  • Introduction
  • Development and implementation of ISPs
  • Installation progress in implementing sustainability
  • Assessing the needs of the ISP development and implementation process
  • Recommendations to improve the ISP development and implementation process.
An installation sustainability plan (ISP) documents long-range plans that address mission, community, and environmental issues developed through a strategic planning process. RAND Arroyo Center examined the experiences of Army installations with sustainability planning and made recommendations to help foster the effective development and implementation of ISPs throughout the Army.
(source: Nielsen Book Data)9780833047076 20160603
SAL3 (off-campus storage)

3. Environment [1969 - ]

Journal/Periodical
v. ill. 28 cm.
Engineering Library (Terman), SAL1&2 (on-campus shelving), SAL3 (off-campus storage)
Book
xi, 24 pages : color illustrations ; 28 cm.
  • Analyzing cyber attacks against combat support
  • A decision support tool for identifying areas of highest interest.
"While combat support communities are not responsible for defending cyber networks, they are required to ensure mission execution, including when under cyber attack. Assessing mission assurance for combat support when under a cyber attack is challenging. The fact that many combat support systems do not reside on the most secure networks indicates potential vulnerabilities to cyber attack. Yet the sheer number of information systems that can be attacked, the range of vulnerabilities that these might have, the large number of combat support functions they support, and the complicated connections all of these have to operational missions makes assessments difficult. Add to this the evolving nature of the threats and vulnerabilities in cyberspace, and the task of finding adequate mitigation plans for all possibilities is formidable. RAND researchers developed a tool that presents a sequential process for identifying those functions and information systems most likely to be problematic for the operational mission during cyber attacks"--Publisher's web site.
SAL3 (off-campus storage)

Looking for different results?

Modify your search: Remove limit(s) Search all fields

Search elsewhere: Search WorldCat Search library website