Combat Air Power: Joint Mission Assessments Needed Before Making Program and Budget Decisions : Report to Congressional CommitteesThe Office, 1996 - Всего страниц: 96 |
Результаты поиска по книге
Результаты 1 – 5 из 18
Стр. ii
... Security in Outsourcing IT Services: Onshore, Offshore and the Cloud Frank Siepmann ISBN 978-1-4398-7909-2 PCI Compliance: The Definitive Guide Abhay Bhargav ISBN 978-1-4398-8740-0 Responsive Security: Be Ready to Be Secure Meng-Chow ...
... Security in Outsourcing IT Services: Onshore, Offshore and the Cloud Frank Siepmann ISBN 978-1-4398-7909-2 PCI Compliance: The Definitive Guide Abhay Bhargav ISBN 978-1-4398-8740-0 Responsive Security: Be Ready to Be Secure Meng-Chow ...
Стр. iii
... security of a state or organization; □ the state of feeling safe, stable, and free from fear or anxiety. “Security” as a concept and as a phenomenon at the end of the cold war has taken on new forms. There are new security agendas, new ...
... security of a state or organization; □ the state of feeling safe, stable, and free from fear or anxiety. “Security” as a concept and as a phenomenon at the end of the cold war has taken on new forms. There are new security agendas, new ...
Стр. 1970
... security . Defining the main concepts Food security Food security is defined by the FAO and the World Health Organisation ( WHO ) as a state in which ' all people at all times have access to sufficient , safe , and nutritious food to ...
... security . Defining the main concepts Food security Food security is defined by the FAO and the World Health Organisation ( WHO ) as a state in which ' all people at all times have access to sufficient , safe , and nutritious food to ...
Стр. 13
... security measures include lock systems and physical access controls, tamper proofing of security-sensitive equipment and environmental controls such as motion detectors, etc. □ Personnel security measures begin with a classification of ...
... security measures include lock systems and physical access controls, tamper proofing of security-sensitive equipment and environmental controls such as motion detectors, etc. □ Personnel security measures begin with a classification of ...
Стр. 39
... security synonymously with secrecy . Security violations in an RTDBS can occur if , for example , information from the " se- cret " database is transferred by corrupt high security transactions to the " public " database where they are ...
... security synonymously with secrecy . Security violations in an RTDBS can occur if , for example , information from the " se- cret " database is transferred by corrupt high security transactions to the " public " database where they are ...
Часто встречающиеся слова и выражения
aggregate capabilities AH-1W Cobra Air Force air power capabilities air power forces Air Power Modernization air power programs air superiority assets attack aircraft attack helicopters billion bombers Capabilities of Potential Chiefs of Staff close support combat air power combat aircraft combatant commanders Comprehensive Joint Assessments Decisions on Air Department of Defense developed DOD's enhance fighter aircraft fighter and attack fiscal year 1991 Formidable and Improving Goldwater-Nichols identified interdiction inventory Joint Chiefs joint mission joint perspective joint requirements Joint Staff Joint Strike Fighter joint warfare joint warfighting capability JROC JWCA process JWCA teams LANTIRN long-range missiles Marine Corps mission area Navy operations Persian Gulf War PGMS potential adversaries Power Is Formidable Power Modernization Programs Priorities Require Comprehensive Require Comprehensive Joint SEAD Secretary of Defense surveillance and reconnaissance targets U.S. air power U.S. forces unmanned aerial vehicles upgrades warfighting capability assessment Wassenaar Arrangement
Популярные отрывки
Стр. 5 - Defense on the priorities of the requirements identified by the commanders of the unified combatant commands and on the extent to which program recommendations and budget proposals of the military departments and other DOD components for a fiscal year conform with priorities established in requirements of the unified combatant commands.
Стр. 55 - F-22 program was initiated in 1981 to meet the evolving threat projected for the mid-1990s. Since the F-22 program entered full-scale development in 1991, the severity of the projected military threat in terms of quantities and capabilities has declined. Instead of confronting thousands of modern Soviet fighters, US air forces are...
Стр. 23 - The Joint Chiefs of Staff are the principal military advisers to the President, the National Security Council, and the Secretary of Defense...
Стр. 13 - ... joint requirements; (4) determine the most cost-effective means to satisfy any shortages; and (5) where excesses exist, assess the relative merits of retiring alternative assets, reducing procurement quantities, or canceling acquisition programs.
Стр. 2 - House of Representatives The Honorable CW Bill Young Chairman The Honorable John P. Murtha Ranking Minority Member Subcommittee on Defense Committee on Appropriations House of Representatives...
Стр. 53 - We agree that overlapping capabilities provide combatant commanders with desirable operational flexibility, but the question is whether, in the post-cold war era, the United States needs or can afford the current levels of overlapping redundancy.
Стр. 5 - In addition to other matters assigned to it by the President or Secretary of Defense, the Joint Requirements Oversight Council shall — "(1) assist the Chairman of the Joint Chiefs of Staff in identifying and assessing the priority of joint military requirements (including existing systems and equipment) to meet the national military strategy; "(2) assist the Chairman in considering alternatives to any acquisition program that has been identified to meet military requirements by evaluating the cost,...
Стр. 11 - Bottom line: a staggering target overkill exists in Fortress America, even for fighting two wars at once. The GAO has documented the redundancies in a 1996 study: The services already have at least 10 ways to hit 65 percent of the thousands of expected ground targets in two major regional conflicts. In addition, service interdiction assets can provide 140 to 160 percent coverage for many types of targets. Despite their numerous overlapping, often redundant, interdiction capabilities, the services...
Стр. 6 - ... alternative solutions, including the joint acquisition of systems with the other services. In addition, because DOD does not routinely develop information on joint mission needs and aggregate capabilities, it has little assurance that decisions to buy, modify, or retire systems are sound.
Стр. 23 - Chairman to (1) provide advice on the priorities of requirements identified by the regional commanders (CINCs) , (2) determine the extent to which service program recommendations and budget proposals conform with the CINCs' priorities, (3) submit alternative program recommendations and budget proposals within projected resource levels to achieve greater conformance with these priorities, and (4) assess the military requirements for defense acquisition programs. The National Defense Authorization...