Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1262 to 1281 of 4119 < previous   next >
Issue DateTitleAuthor(s)
2017-05-05Customizing the Use of TINA (Truth in Negotiation Act) in DoDChong Wang
2017-03-30Customizing the Use of TINA (Truth in Negotiations Act) in the DoDChong Wang
2017-03-30Customizing the Use of TINA (Truth in Negotiations Act) in the DoDChong Wang
2017-12-08Cybersecure Modular Open Architecture Software Systems for Stimulating InnovationWalt Scacchi; Thomas A. Alspaugh
2017-03-30Cybersecure Modular Open Architecture Software Systems for Stimulating InnovationWalt Scacchi; Thomas A. Alspaugh
2017-03-30Cybersecure Modular Open Architecture Software Systems for Stimulating InnovationWalt Scacchi; Thomas A. Alspaugh
2020-03-30Cybersecurity Acquisition Framework Based on Risk Management: Economics PerspectiveC. Ariel Pinto; Unal Tatar; Omer Keskin; Ali Can Kucukozyigit; Goksel Kucukkaya; Omer Ilker Poyraz; Abdulrahman Alfaqiri
2021-08-25Cybersecurity Acquisition Framework Based on Risk Management: Economics PerspectiveC. Ariel Pinto, Omer Faruk Keskin; Goksel Kucukkaya, Omer Ilker Poyraz; Abdulrahman Alfaqiri, Unal Tatar; Ali Can Kucukozyigit
2019-05-13Cybersecurity Acquisition in the Cognitive AgeHoward Pace
2019-05-13Cybersecurity Acquisition Software and Risk ImplicationsMel Yokoyama
2019-11-01Cybersecurity Figure of MeritBrian Erickson
2016-05-05Cybersecurity Figure of MeritBrian Erickson
2022-01-18Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems AcquisitionsJohnathan Mun, Thomas Housel
2022-05-02Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems AcquisitionsJohnathan Mun, Thomas Housel
2022-05-06Cybersecurity, Artificial Intelligence, and Risk Management: Understanding Their Implementation in Military Systems AcquisitionsJohnathan Mun
2018-04-30Cybersecurity: Converting Shock into ActionRobert Tremaine; Paul Shaw
2018-04-30Cybersecurity: Converting Shock Into Action (Part 1)Paul Shaw; Robert Tremaine
2019-05-13Cybersecurity: Converting Shock Into Action (Part 2)Paul Shaw; Robert Tremaine
2019-05-13Cybersecurity: Converting Shock into Action Part 2Paul Shaw; Robert Tremaine
2020-03-30Cycle-times and Cycles of Acquisition ReformMorgan Dwyer; Brenen Tidwell; Alec Blivas; Andrew Hunter