You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Navy has put forth a new construct for its strike forces that enables more effective forward deterrence and rapid response. A key aspect of this construct is the need for flexible, adaptive command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems. To assist development of this capability, the Navy asked the NRC to examine C4ISR for carrier, expeditionary, and strike and missile defense strike groups, and for expeditionary strike forces. This report provides an assessment of C4ISR capabilities for each type of strike group; recommendations for C4ISR architecture for use in major combat operations; promising technology trends; and an examination of organizational improvements that can enable the recommended architecture.
The Navy has put forth a new construct for its strike forces that enables more effective forward deterrence and rapid response. A key aspect of this construct is the need for flexible, adaptive command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems. To assist development of this capability, the Navy asked the NRC to examine C4ISR for carrier, expeditionary, and strike and missile defense strike groups, and for expeditionary strike forces. This report provides an assessment of C4ISR capabilities for each type of strike group; recommendations for C4ISR architecture for use in major combat operations; promising technology trends; and an examination of organizational improvements that can enable the recommended architecture.
To offer security in the maritime domain, governments around the world need the capabilities to directly confront common threats like piracy, drug-trafficking, and illegal immigration. No single navy or nation can do this alone. Recognizing this new international security landscape, the former Chief of Naval Operations called for a collaborative international approach to maritime security, initially branded the "1,000-ship Navy." This concept envisions U.S. naval forces partnering with multinational, federal, state, local and private sector entities to ensure freedom of navigation, the flow of commerce, and the protection of ocean resources. This new book from the National Research Council e...
Conventional prompt global strike (CPGS) is a military option under consideration by the U.S. Department of Defense. This book, the final report from the National Research Council’s Committee on Conventional Prompt Global Strike Capability, analyzes proposed CPGS systems and evaluates the potential role CPGS could play in U.S. defense. U.S. Conventional Prompt Global Strike provides near-, mid-, and long-term recommendations for possible CPGS development, addressing the following questions: Does the United States need CPGS capabilities? What are the alternative CPGS systems, and how effective are they likely to be if proposed capabilities are achieved? What would be the implications o...
Owing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval 'mission assurance'.
This one-volume anthology provides a comprehensive analysis of the role that air power has played in military conflicts over the past century. Comprising sixteen essays penned by a global cadre of leading military experts, A History of Air Warfare chronologically examines the utility of air power from the First World War to the second Lebanon war, campaign by campaign. Each essay lays out the objectives, events, and key players of the conflict in question, reviews the role of air power in the strategic and operational contexts, and explores the interplay between the political framework and mil.
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for sto...
Among its key responsibilities, the U.S. Special Operations Command (SOCOM) plans and synchronizes operations against terrorist networks. At any given moment, SOF are likely to be engaged in some state of the planning or execution of special operations in many countries around the world, spanning a wide range of environments and mission. SOF therefore must be capable of operating in environments ranging from tropical jungle to arctic, maritime to desert, subterranean to mountainous, and rural to urban. Within this vast range additional factors may influence technical and operational requirements including weather, topography, bathymetry, geology, flora, fauna, and human population density. A...
"This book explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters such as earthquakes or tsunamis to nuclear disasters and cyber terrorism"--Provided by publisher.