Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
DSpace
JSPUI
DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets
Learn More
Defense Acquisition Innovation Repository
Browsing by Title
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1303 to 1322 of 4278
< previous
next >
Issue Date
Title
Author(s)
2017-05-05
Customizing the Use of TINA (Truth in Negotiation Act) in DoD
Chong Wang
2017-03-30
Customizing the Use of TINA (Truth in Negotiations Act) in the DoD
Chong Wang
2017-03-30
Customizing the Use of TINA (Truth in Negotiations Act) in the DoD
Chong Wang
2017-12-08
Cybersecure Modular Open Architecture Software Systems for Stimulating Innovation
Walt Scacchi
;
Thomas A. Alspaugh
2017-03-30
Cybersecure Modular Open Architecture Software Systems for Stimulating Innovation
Walt Scacchi
;
Thomas A. Alspaugh
2017-03-30
Cybersecure Modular Open Architecture Software Systems for Stimulating Innovation
Walt Scacchi
;
Thomas A. Alspaugh
2020-03-30
Cybersecurity Acquisition Framework Based on Risk Management: Economics Perspective
C. Ariel Pinto
;
Unal Tatar
;
Omer Keskin
;
Ali Can Kucukozyigit
;
Goksel Kucukkaya
;
Omer Ilker Poyraz
;
Abdulrahman Alfaqiri
2021-08-25
Cybersecurity Acquisition Framework Based on Risk Management: Economics Perspective
C. Ariel Pinto, Omer Faruk Keskin
;
Goksel Kucukkaya, Omer Ilker Poyraz
;
Abdulrahman Alfaqiri, Unal Tatar
;
Ali Can Kucukozyigit
2019-05-13
Cybersecurity Acquisition in the Cognitive Age
Howard Pace
2019-05-13
Cybersecurity Acquisition Software and Risk Implications
Mel Yokoyama
2019-11-01
Cybersecurity Figure of Merit
Brian Erickson
2016-05-05
Cybersecurity Figure of Merit
Brian Erickson
2022-01-18
Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems Acquisitions
Johnathan Mun, Thomas Housel
2022-05-02
Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems Acquisitions
Johnathan Mun, Thomas Housel
2022-05-06
Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems Acquisitions
Johnathan Mun
2018-04-30
Cybersecurity: Converting Shock into Action
Robert Tremaine
;
Paul Shaw
2018-04-30
Cybersecurity: Converting Shock Into Action (Part 1)
Paul Shaw
;
Robert Tremaine
2019-05-13
Cybersecurity: Converting Shock Into Action (Part 2)
Paul Shaw
;
Robert Tremaine
2019-05-13
Cybersecurity: Converting Shock into Action Part 2
Paul Shaw
;
Robert Tremaine
2020-03-30
Cycle-times and Cycles of Acquisition Reform
Morgan Dwyer
;
Brenen Tidwell
;
Alec Blivas
;
Andrew Hunter