Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
DSpace
JSPUI
DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets
Learn More
Defense Acquisition Innovation Repository
Search
Search:
All of DSpace
Defense Acquisition Innovation Repository hosted at the Naval Postgraduate School
Annual Acquisition Research Symposium Proceedings & Presentations
NPS Graduate Student Theses & Reports
Section 809 Panel: Reports, Recommendations & Resource Library
Sponsored Acquisition Research & Technical Reports
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 41-50 of 56 (Search time: 0.002 seconds).
previous
1
...
2
3
4
5
6
next
Item hits:
Issue Date
Title
Author(s)
2016-05-05
The Cybersecurity Challenge in Acquisition
Sonia Kaestner
;
Craig Arndt
;
Robin Dillon-Merrill
2016-05-05
Improving Security in Software Acquisition and Runtime Integration With Data Retention Specifications
Daniel Smullen
;
Travis Breaux
2019-05-13
Cybersecurity: Converting Shock Into Action (Part 2)
Paul Shaw
;
Robert Tremaine
2019-05-13
DOD Weapon System Cybersecurity: How Effective?
Raj Chitikila
2018-04-30
Applying Cause-Effect Mapping to Assess Cybersecurity Vulnerabilities in Model-Centric Acquisition Program Environments
Jack Reid
;
Donna H. Rhodes
2017-03-30
Decision Support for Cybersecurity Risk Assessment
Hanan Hibshi
;
Travis D. Breaux
2016-05-05
Cybersecurity Figure of Merit
Brian Erickson
2017-03-30
Enabling Cybersecurity
Rear Admiral John W. Ailes
2021-05-10
Lessons Learned in Building and Implementing an Effective Cybersecurity Strategy
Carol Woody, Rita Creel
2021-05-20
Lessons Learned in Building and Implementing an Effective Cybersecurity Strategy
Carol Woody
;
Rita Creel
Discover
Author
5
114th United States Congress
3
115th United States Congress
3
Carol Woody
3
Paul Shaw
3
Robert Tremaine
3
United States House of Representa...
2
Ali Can Kucukozyigit
2
Armed Services Committee, United ...
2
Committee on Rules, United States...
2
Craig Arndt
.
next >
Subject
12
Congress
11
Acquisition Reform
11
National Defense Authorization Ac...
10
Chief Information Officer
10
Chief Information Warfare Officer
10
Chief Management Officer
10
United States Cyber Command
9
National Security
8
Broadcasting Board of Governors
8
Combatant Command for Cyber Opera...
.
next >
Date issued
19
2017
16
2016
7
2018
5
2019
3
2020
3
2021
2
2022
1
2015
Has File(s)
56
true