Kirjojen hintavertailu. Mukana 12 252 707 kirjaa ja 12 kauppaa.

Kirjailija

Jonathan William Welburn

Kirjat ja teokset yhdessä paikassa: 3 kirjaa, julkaisuja vuosilta 2017-2020, suosituimpien joukossa An Evaluation of the Department of Defense's Excess Property Program. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

3 kirjaa

Kirjojen julkaisuhaarukka 2017-2020.

An Evaluation of the Department of Defense's Excess Property Program

An Evaluation of the Department of Defense's Excess Property Program

Aaron C Davenport; Jonathan William Welburn; Andrew Lauland; Annelise Pietenpol; Marc Robbins; Erin Rebhan; Patricia Boren; K Jack Riley

RAND
2018
nidottu
The Defense Logistics Agency's Law Enforcement Support Office (LESO) provides excess Department of Defense property to law enforcement agencies across the United States. The authors of this report find that LESO manages an efficient program that effectively reuses excess property. But these efforts are unlikely to resolve perceptions that the program contributes to the militarization of police. This report presents three optional paths ahead.
Measuring Cybersecurity and Cyber Resiliency

Measuring Cybersecurity and Cyber Resiliency

Don Snyder; Lauren A Mayer; Guy Weichenberg; Danielle C Tarraf; Bernard Fox; Myron Hura; Suzanne Genc; Jonathan William Welburn

RAND
2020
nidottu
This report presents a framework for the development of metrics--and a method for scoring them--that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment. There are two types of cyber metrics: working-level metrics to counter an adversary's cyber operations and institutional-level metrics to capture any cyber-related organizational deficiencies.
Stateless Attribution

Stateless Attribution

John S Davis; Benjamin Boudreaux; Jonathan William Welburn

RAND
2017
nidottu
This report reviews the state of cyber attribution and examines alternative options for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, it considers the value of an independent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.