You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This description of the application of the RAND Corporation's PortMan portfolio analysis and management method and Delphi consensus-building method for the National Security Agency (NSA) Information Sharing Services (ISS) division highlights how these methods enable the data-driven analysis of project portfolios and the allocation of research and development (R&D) and operations and maintenance (O&M) resources according to value, risk, and cost.
Annotation Following the attacks of September 11, 2001, many federal agencies began restricting some of their publicly available geospatial data and information from such sources as the World Wide Web. As time passes, however, decisionmakers have begun to ask whether and how such information helps terrorists and other potential attackers to select U.S. homeland sites and prepare for attacks. Under the direction of the National Geospatial-Intelligence Agency, a team of RAND researchers sought to clarify how geospatial information can be exploited by attackers and what kinds of information might prove most valuable. After evaluating both the "supply" and "demand" of geospatial data and informa...
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
These barriers include security concerns, different information technology systems, lack of communication between diverse functional organizations, and insufficient data sharing policies and standards. A comprehensive appendix presents more than 130 examples of how geospatial data assets enable missions at different organizational levels. Finally, the authors offer recommendations for ways to help DoD overcome barriers to geospatial data asset use and sharing."--BOOK JACKET.
A compilation of thought-worthy essays from the faculty and staff of the U.S. Army's premier educational institution for civilian leadership and management, the Army Management Staff College.
Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This ...
An analysis of the performance of medium-armored forces across the range of military operations since World War I yields insights with significant implications for U.S. Army decisions about fielding these units in the future. The authors find that medium-armored forces fare poorly against competent, heavily armored opponents, and that the Stryker and Future Combat Systems will not fill the void created by the retirement of the M551 Sheridan.
Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States should urgently start discussions with key producer nations and also decide on an architecture needed to impose technical controls on new mortar systems that should enter development soon.
The RAND Corporation's Collection Operations Model (COM) is a stochastic, agent-based simulation tool designed to support the analysis of command, control, communications, intelligence, surveillance, and reconnaissance (C3ISR) processes and scenarios. Written for the System Effectiveness Analysis Simulation modeling environment, the COM is used to study processes that require the real-time interaction of many players and to answer questions about force mix, system effectiveness, concepts of operations, basing and logistics, and capability-based assessment. It can represent thousands of autonomous, interacting platforms and explore the capabilities of a wide range of intelligence, surveillanc...
Compares three units that conducted stability operations in the same area in northern Iraq-the 101st Airborne Division (which had only limited digital communications), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT (both equipped with digital networks) and finds that leadership, training, and tactics and procedures are just as important as networking capabilities for improving mission effectiveness in stability operations.