CONTINGENCY OPERATIONS - Rapid Contingency Airfields
In: The military engineer: TME, Band 97, Heft 637, S. 47-48
ISSN: 0026-3982, 0462-4890
40595 Ergebnisse
Sortierung:
In: The military engineer: TME, Band 97, Heft 637, S. 47-48
ISSN: 0026-3982, 0462-4890
In: The journal of Slavic military studies, Band 9, Heft 3, S. 617-664
ISSN: 1351-8046
In: Military technology: Miltech, Band 36, Heft 8, S. 24-26
ISSN: 0722-3226
World Affairs Online
The United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies are evolving so quickly that progress to harden and secure this domain is ephemeral, as systems reach obsolescence in just a few years and revolutionary paradigm shifts, such as cloud computing and ubiquitous mobile devices, can pull the rug out from the best laid defensive planning by introducing entirely new regimes of operations. Contemplating these facts in the context of Department of Defense acquisitions is particularly sobering, because many cyber capabilities, bought within the traditional acquisition framework, may be of limited usefulness by the time that they are delivered to the warfighters. Thus, it is a strategic imperative to improve DoD acquisitions pertaining to cyber capabilities. This paper proposes novel ideas and a framework for addressing these challenges. ; This material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense.
BASE
In: Military technology: Miltech, Band 31, Heft 8, S. 97-100
ISSN: 0722-3226
World Affairs Online
In: Military Operations Research, Band 9, Heft 4, S. 87-91
In: Nordic journal of international law, Band 83, Heft 2, S. 128-167
ISSN: 1571-8107
The Copenhagen Process Principles and Guidelines on the Handling of Detainees in International Military Operations are intended to contribute both to the humane treatment of detainees and the effectiveness of military operations. This article seeks to stimulate discussion concerning the Principles and Guidelines. It also provides the international community with a better understanding of a very successful process for developing normative standards or soft law. Finally, it explains some of the main issues dealt with during the Process, and some of the key aspects of the provisions contained in the Principles and Guidelines.
This book offers one of the first comprehensive academic views on Just Cause, the December 1989 U.S. military intervention in Panama. It presents excellent positions for the reader to consider and give a comprehensive view of all of the factors and events that prompted the operation.
In: http://hdl.handle.net/2027/mdp.39015081169610
Reuse of record except for individual research requires license from Congressional Information Service, Inc. ; Hearings held July 10-Aug. 14, 1974. ; CIS Microfiche Accession Numbers: CIS 75 H401-6 ; Microfiche. ; Mode of access: Internet.
BASE
In: The military engineer: TME, Band 98, Heft 643, S. 47-48
ISSN: 0026-3982, 0462-4890
In: The military engineer: TME, Band 98, Heft 643, S. 51-52
ISSN: 0026-3982, 0462-4890
In: The military engineer: TME, Band 96, Heft 631, S. 41-42
ISSN: 0026-3982, 0462-4890
In: The military engineer: TME, Band 94, Heft 618, S. 37-38
ISSN: 0026-3982, 0462-4890
In: Social service review: SSR, Band 11, Heft 4, S. 741-744
ISSN: 1537-5404