6 books • 1 series
Automating Army Convoys
Applying Best Practices to Military Commercial-Derivative Aircraft Engine Sustainment
Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy
Modeling Terrorism Risk to the Air Transportation System
A Cyberworm That Knows No Boundaries (Occasional Papers)
Finding Services for an Open Architecture