Skip to Main Content
Have library access? Log in through your library


Search within Technology:

3 Journals in JSTOR Date Range
CALICO Journal 2007 - 2015
East Asian Science, Technology, and Medicine 2015
The New Atlantis 2004 - 2015
763 Books in JSTOR Copyright Date
The 2008 Battle of Sadr City: Reimagining Urban Combat OPEN ACCESS 2013
21st Century Chinese Cyberwarfare 2012
50 Top IT Project Management Challenges 2012
9 to 5: Do You Know If Your Boss Knows Where You Are? Case Studies of Radio Frequency Identification Usage in the Workplace OPEN ACCESS 2005
Above the Clouds: Managing Risk in the World of Cloud Computing 2010
Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing OPEN ACCESS 2014
Adapting to a Changing Colorado River: Making Future Water Deliveries More Reliable Through Robust Management Strategies OPEN ACCESS 2013
Addiction by Design: Machine Gambling in Las Vegas 2012
Aepinus's Essay on the Theory of Electricity and Magnetism 1979
After Saddam: Prewar Planning and the Occupation of Iraq OPEN ACCESS 2008
After the War: Nation-Building from FDR to George W. Bush OPEN ACCESS 2008
The Age of Smoke: Environmental Policy in Germany and the United States, 1880-1970 2009
Agent_Zero: Toward Neurocognitive Foundations for Generative Social Science: Toward Neurocognitive Foundations for Generative Social Science 2013
Agile: An Executive Guide: Real results from IT budgets 2011
Agile Governance and Audit: An overview for auditors and agile teams 2014
Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation 2010
Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation 2014
Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization 2010
Agile SAP: Introducing flexibility, transparency and speed to SAP implementations 2013
Agrarian Dreams: The Paradox of Organic Farming in California 2014
Agrarianism and the Good Society: Land, Culture, Conflict, and Hope 2007
Agricultural Cooperation: Selected Readings 1963
Air Attack Against Wildfires: Understanding U.S. Forest Service Requirements for Large Aircraft OPEN ACCESS 2012
Air Force Major Defense Acquisition Program Cost Growth Is Driven by Three Space Programs and the F-35A: Fiscal Year 2013 President's Budget Selected Acquisition Reports OPEN ACCESS 2014
Aircraft Dynamics and Automatic Control 1973
Allocating Marine Expeditionary Unit Equipment and Personnel to Minimize Shortfalls: Second Edition OPEN ACCESS 2013
An Alternative Internet: Radical Media, Politics and Creativity 2004
American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security 2014
American Carrier Air Power at the Dawn of a New Century OPEN ACCESS 2005
American Georgics: Writings on Farming, Culture, and the Land 2011
Analyses of the Department of Defense Acquisition Workforce: Update to Methods and Results through FY 2011 OPEN ACCESS 2013
Annotated Bibliography of Films in Automation, Data Processing, and Computer Science 1967
The App Generation: How Today's Youth Navigate Identity, Intimacy, and Imagination in a Digital World 2013
Application security in the ISO27001 Environment 2008
Archaeology in the Digital Era: Papers from the 40th Annual Conference of Computer Applications and Quantitative Methods in Archaeology (CAA), Southampton, 26-29 March 2012 2013
The Archaeology of Class War: The Colorado Coalfield Strike of 1913-1914 2009
Archaeometallurgy in Mesoamerica: Current Approaches and New Perspectives 2013
Are U.S. Military Interventions Contagious over Time?: Intervention Timing and Its Implications for Force Planning OPEN ACCESS 2013
Armed and Dangerous?: UAVs and U.S. Security OPEN ACCESS 2014
Arms and Influence 1966
Arms Transfers under Nixon: A Policy Analysis 1983
The Army's Role in Overcoming Anti-Access and Area Denial Challenges OPEN ACCESS 2013
The Art of Managing Longleaf: A Personal History of the Stoddard-Neel Approach 2010
The Artificial Ear: Cochlear Implants and the Culture of Deafness 2010
Asbestos and Fire: Technological Tradeoffs and the Body at Risk 2005
Asia's Space Race: National Motivations, Regional Rivalries, and International Risks 2012
Assessing Aegis Program Transition to an Open-Architecture Model OPEN ACCESS 2013
Assessing Freedom of Movement for Counterinsurgency Campaigns OPEN ACCESS 2012
Assessing Information Security: Strategies, Tactics, Logic and Framework 2010
Assessing Information Security: Strategies, Tactics, Logic and Framewortk 2014
Assessing Irregular Warfare: A Framework for Intelligence Analysis OPEN ACCESS 2008
Assessing IT Projects to Ensure Successful Outcomes 2015
Assessing Locally Focused Stability Operations OPEN ACCESS 2014
Assessing the Tradecraft of Intelligence Analysis OPEN ACCESS 2008
Assessment of Beddown Alternatives for the F-35: Executive Summary OPEN ACCESS 2013
Assessment of Beddown Alternatives for the F-35 OPEN ACCESS 2013
Assessment of Joint Improvised Explosive Device Defeat Organization (JIEDDO) Training Activity OPEN ACCESS 2013
An Assessment of Program Sustainability in Three Bureau of Justice Assistance Criminal Justice Domains OPEN ACCESS 2014
An Assessment of the Ability of the U.S. Department of Defense and the Services to Measure and Track Language and Culture Training and Capabilities Among General Purpose Forces OPEN ACCESS 2012
Assessment of the AHRQ Patient Safety Initiative: Focus on Implementation and Dissemination Evaluation Report III (2004–2005) OPEN ACCESS 2007
An Assessment of the Assignments and Arrangements of the Executive Agent for DoD Biometrics and Status Report on the DoD Biometrics Enterprise OPEN ACCESS 2012
Atlantic Automobilism: Emergence and Persistence of the Car, 1895-1940 2015
Authority to Issue Interoperability Policy OPEN ACCESS 2014
Auto Mania: Cars, Consumers, and the Environment 2007
Autoaffection: Unconscious Thought in the Age of_x000B_Technology 2000
Autonomous Vehicle Technology: A Guide for Policymakers OPEN ACCESS 2014
Availability and Capacity Management in the Cloud: An ITSM Narrative Account 2014
Balancing Agile Combat Support Manpower to Better Meet the Future Security Environment OPEN ACCESS 2014
Balancing on a Planet: The Future of Food and Agriculture 2014
Balsam Fir: A Monographic Review 1965
Barriers to Bioweapons: The Challenges of Expertise and Organization for Weapons Development 2014
Bees in America: How the Honey Bee Shaped a Nation 2005
Before Silent Spring: Pesticides and Public Health in Pre-DDT America: Pesticides and Public Health in Pre-DDT America 1974
The Best Technology Writing 2009 2009
A Better Way to Build: A History of the Pankow Companies 2013
BIOBAZAAR: The Open Source Revolution and Biotechnology 2008
Biomolecular Feedback Systems 2015
Bioterrorism Preparedness Training and Assessment Exercises for Local Public Health Agencies OPEN ACCESS 2005
Blue Skies: A History of Cable Television 2008
Blue-Collar Stratification: Autoworkers in Four Countries: Autoworkers in Four Countries 1976
Bodies of Tomorrow: Technology, Subjectivity, Science Fiction 2007
Brandishing Cyberattack Capabilities OPEN ACCESS 2013
Breaking the Addiction to Process: An Introduction to Agile Project Management 2011
Breathing Race into the Machine: The Surprising Career of the Spirometer from Plantation to Genetics 2014
Bridging the Gap: Prototype Tools to Support Local Disaster Preparedness Planning and Collaboration OPEN ACCESS 2012
British Rearmament in the Thirties: Politics and Profits: Politics and Profits 1977
The Broadband Problem: Anatomy of a Market Failure and a Policy Dilemma 2004
Build a Security Culture 2015
Building Better Homes: Government Strategies for Promoting Innovation in Housing OPEN ACCESS 2003
Building Security in the Persian Gulf OPEN ACCESS 2010
Building Toward an Unmanned Aircraft System Training Strategy OPEN ACCESS 2014
Business Continuity Management: Choosing to Survive 2012
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency StudyA-Volume 1 OPEN ACCESS 2007
C. Francis Jenkins, Pioneer of Film and Television 2014
Camp Colt to Desert Storm: The History of U.S. Armored Forces 1999
Canadian Woods: Their Properties and Uses 1981
Capabilities-Based Planning for Energy Security at Department of Defense Installations OPEN ACCESS 2013
The Case for ISO27001:2013 2013
Case Studies of Existing Human Tissue Repositories: "Best Practices" for a Biospecimen Resource for the Genomic and Proteomic Era OPEN ACCESS 2003
Cash For Your Trash: Scrap Recycling in America 2005
The Cassava Transformation: Africa's Best-Kept Secret 2002
Catalogs, Services and Portfolios: An ITSM success story 2014
Centrality of Agriculture: Between Humankind and the Rest of Nature 1996
Challenge of Arctic Shipping: Science, Environmental Assessment, and Human Values 1990
The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency OPEN ACCESS 2009
The Challenge of Violent Drug-Trafficking Organizations: An Assessment of Mexican Security Based on Existing RAND Research on Urban Unrest, Insurgency, and Defense-Sector Reform OPEN ACCESS 2011
Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement OPEN ACCESS 2001
Challenges in Virtual Collaboration: Videoconferencing, Audioconferencing, and Computer-Mediated Communications OPEN ACCESS 2004
Changing the Army's Weapon Training Strategies to Meet Operational Requirements More Efficiently and Effectively OPEN ACCESS 2014
Changing the IT Leader's Mindset: Time for revolution rather than evolution 2010
Characterization of the Electrical Environment 1976
Charting the Course for a New Air Force Inspection System OPEN ACCESS 2013
Cheap Wage Labour: Race and Gender in the Fisheries of British Columbia 1996
Chicago River Bridges 2013
Chicken: The Dangerous Transformation of America’s Favorite Food 2005
The Chief Information Security Officer: Insights, tools and survival skills 2011
China in 2020: A New Type of Superpower 2011
Cinematic Appeals: The Experience of New Movie Technologies 2013
Citizenship and Participation in the Information Age 2002
Cloning: A Biologist Reports 1979
Cloud Computing: Assessing the risks 2012
Cloud Security and Governance: Who's on your cloud? 2010
The Cloud: Understanding the Security, Privacy and Trust Challenges OPEN ACCESS 2011
Coding Freedom: The Ethics and Aesthetics of Hacking 2013
The Columbia Guide to Online Style: Second Edition 2006
Commercial Intratheater Airlift: Cost-Effectiveness Analysis of Use in U.S. Central Command OPEN ACCESS 2013
A Common Operating Picture for Air Force Materiel Sustainment: First Steps OPEN ACCESS 2008
Competition and Chaos: U.S. Telecommunications since the 1996 Telecom Act 2005
Competition and Innovation in the U.S. Fixed-Wing Military Aircraft Industry OPEN ACCESS 2003
Compliance by Design: IT controls that work 2011
The Computer and the Brain 1986
Computer Forensics: A Pocket Guide 2010
The Concise PRINCE2®: A Pocket Guide 2013
Confronting Space Debris: Strategies and Warnings from Comparable Examples Including Deepwater Horizon OPEN ACCESS 2010
Connected, or What It Means to Live in the Network Society 2003
Conserving Southern Longleaf: Herbert Stoddard and the Rise of Ecological Land Management 2011
Continentalizing Canadian Telecommunications: The Politics of Regulatory Reform 2003
Contrast-Enhanced Clinical Magnetic Resonance Imaging 1997
Controles estratégicos y operacionales de la TI 2013
Costs of Flying Units in Air Force Active and Reserve Components OPEN ACCESS 2013
Cotton Fields No More: Southern Agriculture, 1865-1980 1984
Count Not the Dead: The Popular Image of the German Submarine 1995
Counterinsurgency in Afghanistan: RAND Counterinsurgency Study--Volume 4 OPEN ACCESS 2008
Counterinsurgency Scorecard: Afghanistan in Early 2011 Relative to the Insurgencies of the Past 30 Years OPEN ACCESS 2011
Counterinsurgency Scorecard: Afghanistan in Early 2013 Relative to Insurgencies Since World War II OPEN ACCESS 2013
Cream of the Crop: Canadian Aircrew, 1939-1945 1996
Creating Wine: The Emergence of a World Industry, 1840-1914 2011
Crisis and Escalation in Cyberspace OPEN ACCESS 2012
Crisis Stability and Long-Range Strike: A Comparative Analysis of Fighters, Bombers, and Missiles OPEN ACCESS 2013
Crowded Orbits: Conflict and Cooperation in Space 2014
Cruise Missile Penaid Nonproliferation: Hindering the Spread of Countermeasures Against Cruise Missile Defenses OPEN ACCESS 2014
Cuba After Castro: Legacies, Challenges, and Impediments OPEN ACCESS 2004
Cuba's Energy Future: Strategic Approaches to Cooperation 2010
The Culture of Print: Power and the Uses of Print in Early Modern Europe 1989
The Cutting Edge: A Half Century of U.S. Fighter Aircraft R&D OPEN ACCESS 1998
Cyber Essentials: A Pocket Guide 2014
Cyber Risks for Business Professionals: A Management Guide 2010
Cyberdeterrence and Cyberwar OPEN ACCESS 2009
Cybering Democracy: Public Space and the Internet 2002
Cyberliteracy: Navigating the Internet with Awareness 2001
Cyberspaces of Everyday Life 2006
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger 2008
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment 2014
A Cyberworm that Knows No Boundaries OPEN ACCESS 2011
Dancing with the River: People and Life on the Chars of South Asia 2013
Dark Writing: Geography, Performance, Design 2009
Darwinian Agriculture: How Understanding Evolution Can Improve Agriculture 2012
The Data Governance Imperative 2009
Data Protection and the Cloud: Are the risks too great? 2015
Data Protection Compliance in the UK: A Pocket Guide 2010
Data Protection vs. Freedom of Information: Access and Personal Data 2008
The Defender’s Dilemma: Charting a Course Toward Cybersecurity OPEN ACCESS 2015
The Definitive Guide to IT Service Metrics 2012
The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation 2009
Delete: The Virtue of Forgetting in the Digital Age 2009
A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs OPEN ACCESS 2009
Deployment Experiences of Guard and Reserve Families: Implications for Support and Retention OPEN ACCESS 2008
The Deployment Life Study: Methodological Overview and Baseline Sample Description OPEN ACCESS 2014
Designing a System for Collecting Policy-Relevant Data for the Kurdistan Region—Iraq OPEN ACCESS 2014
Deterrence—From Cold War to Long War: Lessons from Six Decades of RAND Research OPEN ACCESS 2008
Developing Navy Capability to Recover Forces in Chemical, Biological, and Radiological Hazard Environments OPEN ACCESS 2013
Developing Robust Strategies for Climate Change and Other Risks: A Water Utility Framework OPEN ACCESS 2014
Developing Senior Navy Leaders: Requirements for Flag Officer Expertise Today and in the Future OPEN ACCESS 2008
Development of a Model for the Validation of Work Relative Value Units for the Medicare Physician Fee Schedule OPEN ACCESS 2015
The Diffusion and Value of Healthcare Information Technology OPEN ACCESS 2005
The Diffusion of Military Power: Causes and Consequences for International Politics 2010
Digital Critical Editions 2014
Digital Depression: Information Technology and Economic Crisis 2014
Digital Dice: Computational Solutions to Practical Probability Problems 2008
Digital Evidence and the U.S. Criminal Justice System: Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence OPEN ACCESS 2015
Digital Formations: IT and New Architectures in the Global Realm 2005
Digital Government: Technology and Public Sector Performance 2005
Digital Humanities Pedagogy: Practices, Principles and Politics OPEN ACCESS 2012
Digital Medicine: Health Care in the Internet Era 2009
The Digital Public Domain: Foundations for an Open Culture OPEN ACCESS 2012
Digital Schools: How Technology Can Transform Education 2012
Digital Sensations: Space, Identity, and Embodiment in Virtual Reality 1999
Digital State: The Story of Minnesota's Computing Industry 2013
Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives 2014
Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives 2008
Disaster Recovery Project Management: Bringing Order from Chaos 2011
Discourses on Social Software OPEN ACCESS 2009
Disrupting Science: Social Movements, American Scientists, and the Politics of the Military, 1945-1975 2008
Distributed Algorithms on Graphs 1986
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms 2009
Do Joint Fighter Programs Save Money? OPEN ACCESS 2013
Do Joint Fighter Programs Save Money?: Technical Appendixes on Methodology OPEN ACCESS 2013
DoD and Commercial Advanced Waveform Developments and Programs with Multiple Nunn-McCurdy Breaches, Volume 5 OPEN ACCESS 2014
Down to Earth: Satellite Technologies, Industries, and Cultures 2012
The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World OPEN ACCESS 2004
Early American Technology: Making and Doing Things From the Colonial Era to 1850 1994
E-Discovery and the Federal Rules of Civil Procedures 2007
The Effectiveness of Remotely Piloted Aircraft in a Permissive Hunter-Killer Scenario OPEN ACCESS 2014
Effects of Military Service on Earnings and Education Revisited: Variation by Service Duration, Occupation, and Civilian Unemployment OPEN ACCESS 2014
eGirls, eCitizens: Putting Technology, Theory and Policy into Dialogue with Girls’ and Young Women’s Voices OPEN ACCESS 2015
El poder de la carne 2008
Electric Sounds: Technological Change and the Rise of Corporate Mass Media 2007
Electricity Requirements for a Digital Society OPEN ACCESS 2002
Electronic Elections: The Perils and Promises of Digital Democracy 2008
The Electronic Eye: The Rise of Surveillance Society 1994
The Electronic Silk Road: How the Web Binds the World Together in Commerce 2013
Electronic Tribes: The Virtual Worlds of Geeks, Gamers, Shamans, and Scammers 2008
Email Security: A Pocket Guide 2010
Embracing the Fog of War: Assessment and Metrics in Counterinsurgency OPEN ACCESS 2012
Emerging Trends in China's Development of Unmanned Systems OPEN ACCESS 2015
The Empire of Mind: Digital Piracy and the Anti-Capitalist Movement 2005
Empire of the Air 2013
Employer Partnership Program Analysis of Alternatives OPEN ACCESS 2012
Employing Land-Based Anti-Ship Missiles in the Western Pacific OPEN ACCESS 2013
Enabling Early Sustainment Decisions: Application to F-35 Depot-Level Maintenance OPEN ACCESS 2013
The Enchantments of Technology 2005
The End of the Soul: Scientific Modernity, Atheism, and Anthropology in France 2003
Ending the U.S. War in Iraq: The Final Transition, Operational Maneuver, and Disestablishment of United States Forces-Iraq OPEN ACCESS 2013
Energy and Security in the Industrializing World 1990
Energy and the National Defense 1981
Energy Capitals: Local Impact, Global Influence 2014
Energy Services Analysis: An Alternative Approach for Identifying Opportunities to Reduce Emissions of Greenhouse Gases OPEN ACCESS 2012
The Engine of Complexity: Evolution as Computation 2013
Engineering and Social Justice: In the University and Beyond 2012
Engineering in American Society: 1850--1875 1969
Engineering in Pre-College Settings: Synthesizing Research, Policy, and Practices 2014
Engineering Nature: Water, Development, and the Global Spread of American Environmental Expertise 2011
Engineering Philadelphia: The Sellers Family and the Industrial Metropolis 2013
Enhanced Army Airborne Forces: A New Joint Operational Capability OPEN ACCESS 2014
The Enlightenment Cyborg: A History of Communications and Control in the Human Machine, 1660-1830 2007
Enterprise Architecture: A Pocket Guide 2009
Environmental Pollution Studies 1999
Environmental Safety of Genetically Engineered Crops 2011
Essays on the Early History of Plant Pathology and Mycology in Canada 1994
The Essential Agrarian Reader: The Future of Culture, Community, and the Land 2003
Estimating the Value of Water-Use Efficiency in the Intermountain West OPEN ACCESS 2008
Europe's Role in Nation-Building: From the Balkans to the Congo OPEN ACCESS 2008
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles OPEN ACCESS 2008
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage OPEN ACCESS 2014
Every Twelve Seconds: Industrialized Slaughter and the Politics of Sight 2011
Everything you want to know about Agile: How to get Agile results in a less-than-agile organization 2012
Everything you want to know about Business Continuity 2012
An Evolutionary Model of Industry Transformation and the Political Sustainability of Emission Control Policies OPEN ACCESS 2013
An Excel Tool to Assess Acquisition Program Risk OPEN ACCESS 2013
An Executive Perspective on Workforce Planning OPEN ACCESS 2004
Expanding the Envelope: Flight Research at NACA and NASA 2001
Expendable Missiles vs. Reusable Platform Costs and Historical Data OPEN ACCESS 2012
Exploding the Myths Surrounding ISO9000: A practical implementation guide 2013
Exploring Agrodiversity 2001
Exploring Information Superiority: A Methodology for Measuring the Quality of Information and Its Impact on Shared Awareness OPEN ACCESS 2004
Fabricating History: English Writers on the French Revolution 1988
Facilitating Information Sharing Across the International Space Community: Lessons from Behavioral Science OPEN ACCESS 2013
Factories in the Field: The Story of Migratory Farm Labor in California 1999
Falling Behind?: Boom, Bust, and the Global Race for Scientific Talent 2014
Federal Financial Incentives to Induce Early Experience Producing Unconventional Liquid Fuels OPEN ACCESS 2008
Feeding the World: An Economic History of Agriculture, 1800-2000 2005
Finding Candidate Options for Investment: From Building Blocks to Composite Options and Preliminary Screening OPEN ACCESS 2008
First Steps Toward Improving DoD STEM Workforce Diversity: Response to the 2012 Department of Defense STEM Diversity Summit OPEN ACCESS 2013
Fishing Places, Fishing People: Traditions and Issues in Canadian Small-Scale Fisheries 1999
Folklore and the Internet: Vernacular Expression in a Digital World OPEN ACCESS 2009
Food and Drug Legislation in the New Deal 1970
Food and Everyday Life on Kentucky Family Farms, 1920-1950 2006
Forecast for Japan: Security in the 1970's: Security in the 1970's 1972
Fortifying China: The Struggle to Build a Modern Defense Economy 2009
Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector OPEN ACCESS 2015
Fostering Innovation in the U.S. Court System: Identifying High-Priority Technology and Other Needs for Improving Court Operations and Outcomes OPEN ACCESS 2016
Foundation for Integrating Employee Health Activities for Active Duty Personnel in the Department of Defense OPEN ACCESS 2009
France's War in Mali: Lessons for an Expeditionary Army OPEN ACCESS 2014
Freedom and Information: Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security OPEN ACCESS 2006
French Inventions of the Eighteenth Century 1952
From A to: Keywords of Markup 2010
From Flood Control to Integrated Water Resource Management: Lessons for the Gulf Coast from Flooding in Other Places in the Last Sixty Years OPEN ACCESS 2006
From Insurgency to Stability: Volume I: Key Capabilities and Practices OPEN ACCESS 2011
From Insurgency to Stability: Volume II: Insights from Selected Case Studies OPEN ACCESS 2011
From Outpost to Outport: A Structural Analysis of the Jersey-Gaspé Cod Fishery, 1767-1886 1991
From 'Stone-Age' to 'Real-Time': Exploring Papuan Temporalities, Mobilities and Religiosities OPEN ACCESS 2015
From the Cradle to the Coalmine: The Story of Children in Welsh Mines 2014
From the Farm to the Table: What All Americans Need to Know about Agriculture 2006
The Future of Driving in Developing Countries OPEN ACCESS 2014
The Future of Fossil Fuels: From "Hubbert's Peak" 2001
The Future of Genetically Modified Crops: Lessons from the Green Revolution OPEN ACCESS 2004
The Future of Mobility: Scenarios for the United States in 2030 OPEN ACCESS 2013
The Future of Mobility: Scenarios for the United States in 2030, Appendixes C–G OPEN ACCESS 2013
The Future of the Citizen-Soldier Force: Issues and Answers 1994
Future U.S. Security Relationships with Iraq and Afghanistan: U.S. Air Force Roles OPEN ACCESS 2008
Gambling on Ore: The Nature of Metal Mining in the United States, 1860–1910 2013
Gene Banks and the World's Food 1987
General Military Training: Standardization and Reduction Options OPEN ACCESS 2012
Genetic Improvement of Crops: Emergent Techniques 1980
The Geopolitics Of Super Power 1988
German Rearmament and the West, 1932-1933 1979
Getting on the Same Page: Identifying Goals for Technology Use in Early Childhood Education OPEN ACCESS 2014
Global Analysis: Papers in Honor of K. Kodaira (PMS-29): Papers in Honor of K. Kodaira (PMS-29) 1969
Global "Body Shopping": An Indian Labor System in the Information Technology Industry 2007
The Global Course of the Information Revolution: Recurring Themes and Regional Variations OPEN ACCESS 2003
Global Population: History, Geopolitics, and Life on Earth 2014
The Global Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications OPEN ACCESS 2006
The Global Technology Revolution: Bio/Nano/Materials Trends and Their Synergies with Information Technology by 2015 OPEN ACCESS 2001
Going Global?: U.S. Government Policy and the Defense Aerospace Industry OPEN ACCESS 2002
Going Mobile: How Wireless Technology is Reshaping Our Lives 2015
Gold Rush Diary: Being the Journal of Elisha Douglas Perkins on the Overland Trail in the Spring and Summer of 1849 1967
The Golden Ticket: P, NP, and the Search for the Impossible 2013
Google's PageRank and Beyond: The Science of Search Engine Rankings 2006
Governance and Internal Controls for Cutting Edge IT 2013
Governance of Enterprise IT based on COBIT®5: A Management Guide 2013
The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements 2008
Grain Storage: The Role of Fungi in Quality Loss 1969
The Great Kanawha Navigation 2000
Great Lakes Fisheries Policy and Management: A Binational Perspective 2013
The Green Agenda: A Business Guide 2009
Green Cities: Urban Growth and the Environment 2006
Green Innovation in China: China's Wind Power Industry and the Global Transition to a Low-Carbon Economy 2013
The Green Office: A Business Guide 2009
Greening the Data Center: A Pocket Guide 2009
Growing American Rubber: Strategic Plants and the Politics of National Security 2009
Guesstimation 2.0: Solving Today's Problems on the Back of a Napkin 2012
A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool 2014
Hacker Culture 2002
Hackers Wanted: An Examination of the Cybersecurity Labor Market OPEN ACCESS 2014
Handbook of Animal Radio-Tracking 1983
Hard Fighting: Israel in Lebanon and Gaza OPEN ACCESS 2011
Healing Appalachia: Sustainable Living through Appropriate Technology 2007
Healthcare Coverage and Disability Evaluation for Reserve Component Personnel: Research for the 11th Quadrennial Review of Military Compensation OPEN ACCESS 2012
Hello, Central?: Gender, Technology, and Culture in the Formation of Telephone Systems 1991
Henri Poincare: A Scientific Biography 2013
The Herbalist in the Kitchen 2007
Hidden Hunger: Gender and the Politics of Smarter Foods OPEN ACCESS 2013
High-Priority Information Technology Needs for Law Enforcement OPEN ACCESS 2015
Highway Infrastructure and the Economy: Implications for Federal Policy OPEN ACCESS 2011
Hiram Martin Chittenden: His Public Career 1973
Historic Maps of Kentucky 1979
Hollywood Science: Movies, Science, and the End of the World 2007
Honey, I'm Homemade: Sweet Treats from the Beehive across the Centuries and around the World 2010
The Horse, the Wheel, and Language: How Bronze-Age Riders from the Eurasian Steppes Shaped the Modern World 2007
The Horsemen of Athens 1988
How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts OPEN ACCESS 2014
How Insurgencies End OPEN ACCESS 2010
How Much Is Enough?: Shaping the Defense Program, 1961-1969 OPEN ACCESS 1971
How Round Is Your Circle?: Where Engineering and Mathematics Meet 2008
How Terrorist Groups End: Lessons for Countering al Qa'ida OPEN ACCESS 2008
How to Survive a Data Breach: A Pocket Guide 2009
Hubbert's Peak: The Impending World Oil Shortage (New Edition) 2001
Identification and Analysis of Technology Emergence Using Patent Classification OPEN ACCESS 2014
Identity Theft and Fraud: Evaluating and Managing Risk 2012
The Impact of Adopting Time-of-Day Tolling: Case Study of 183A in Austin, Texas OPEN ACCESS 2015
The impact of migration on transport and congestion OPEN ACCESS 2011
Impacts on U.S. Energy Expenditures and Greenhouse-Gas Emissions of Increasing Renewable-Energy Use OPEN ACCESS 2008
Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión 2012
Implementation Actions for Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes OPEN ACCESS 2014
Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden 2012
Implementing Service Quality based on ISO/IEC 20000: A Management Guide 2012
Implications of an Air Force Budget Downturn on the Aircraft Industrial Base: An Exploratory Analysis OPEN ACCESS 2013
Implications of Modern Decision Science for Military Decision-Support Systems OPEN ACCESS 2005
Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes OPEN ACCESS 2012
Improving Air Force Depot Programming by Linking Resources to Capabilities OPEN ACCESS 2012
Improving Air Force Enterprise Resource Planning-Enabled Business Transformation OPEN ACCESS 2013
Improving Federal and Department of Defense Use of Service-Disabled Veteran-Owned Businesses OPEN ACCESS 2013
Improving Interagency Information Sharing Using Technology Demonstrations: The Legal Basis for Using New Sensor Technologies for Counterdrug Operations Along the U.S. Border OPEN ACCESS 2014
Improving Inventory Management of Organizational and Individual Equipment at Central Issue Facilities OPEN ACCESS 2013
Improving Strategic Competence: Lessons from 13 Years of War OPEN ACCESS 2014
Impulsive and Hybrid Dynamical Systems: Stability, Dissipativity, and Control 2006
In Athena's Camp: Preparing for Conflict in the Information Age OPEN ACCESS 1997
In Hindsight: A compendium of Business Continuity case studies 2014
Increasing Aircraft Carrier Forward Presence: Changing the Length of the Maintenance Cycle OPEN ACCESS 2008
Increasing Flexibility and Agility at the National Reconnaissance Office: Lessons from Modular Design, Occupational Surprise, and Commercial Research and Development Processes OPEN ACCESS 2013
Indian Security Policy: Foreword by Joseph S. Nye 1986
Individual Preparedness and Response to Chemical, Radiological, Nuclear, and Biological Terrorist Attacks: The Reference Guide OPEN ACCESS 2003
Individual-based Modeling and Ecology: 2005
The Information Revolution in Asia OPEN ACCESS 2003
Information Security A Practical Guide: Bridging the gap between IT and management 2015
Information Security Breaches: Avoidance and Treatment based on ISO27001 2014
Information Security Breaches: Avoidance and Treatment based on ISO27001 2009
Information Security Risk Management for ISO27001/ISO27002 2010
The Information Systems Academic Discipline in Australia OPEN ACCESS 2008
Information Systems Foundations: Constructing and Criticising OPEN ACCESS 2005
Information Systems Foundations: The Role of Design Science OPEN ACCESS 2010
Information Systems Foundations: Theory Building in Information Systems OPEN ACCESS 2012
Information Systems Foundations: Theory, Representation and Reality OPEN ACCESS 2007
The Insider Threat: Combatting the Enemy Within 2009
Instabilities and Fronts in Extended Systems 1990
Insurgency Online: Web Activism and Global Conflict 2006
Integrated Measurement - KPIs and Metrics for ITSM: A narrative account 2013
Integrating Civilian Agencies in Stability Operations OPEN ACCESS 2009
Integrating Information into the Engineering Design Process OPEN ACCESS 2014
Integrating the Department of Defense Supply Chain OPEN ACCESS 2012
The Intellective Space: Thinking beyond Cognition 2015
Interfaces of the Word: Studies in the Evolution of Consciousness and Culture 1997
Internet Literature in China 2015
The Internet of Elsewhere: The Emergent Effects of a Wired World 2011
Introducción a la mecánica de fluidos 2013
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things 2015
An Introduction to Hacking and Crimeware: A Pocket Guide 2012
An Introduction to Information Security and ISO27001:2013: A Pocket Guide 2013
Introduction to Modeling Convection in Planets and Stars: Magnetic Field, Density Stratification, Rotation 2014
Inventing the PC: The MCM/70 Story 2011
Iran's Political, Demographic, and Economic Vulnerabilities OPEN ACCESS 2008
Is American Science in Decline? 2012
ISO14001 Step by Step: A practical guide 2011
ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme 2012
ISO22301: A Pocket Guide 2013
ISO27001 in a Windows ® Environment: The best practice handbook for a Microsoft® Windows® environment 2010
ISO27001 / ISO27002: A Pocket Guide 2013
ISO27001:2013 Assessments Without Tears 2013
ISO/IEC 20000: An Introduction to the global standard for service management 2011
ISO/IEC 38500: The IT Governance Standard 2008
IT Asset Management: A Pocket Survival Guide 2011
IT Governance: A Pocket Guide 2007
IT Governance: Guidelines for Directors 2005
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT 2009
IT Governance to Drive High Performance: Lessons from Accenture 2010
IT Governance Today: A Practitioners Handbook 2005
IT Induction and Information Security Awareness: A Pocket Guide 2010
IT Regulatory Compliance in North America 2007
IT Regulatory Compliance in the UK 2007
IT Strategic and Operational Controls 2010
ITIL and Organizational Change 2013
ITIL Foundation Essentials: The exam facts you need 2012
ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond 2013
It's All About Relationships: What ITIL® doesn't tell you 2013
The ITSM Iron Triangle: Incidents, changes and problems 2012
Junkware 2011
Just War Tradition and the Restraint of War: A Moral and Historical Inquiry 1981
Keeping Law Enforcement Connected: Information Technology Needs from State and Local Agencies OPEN ACCESS 2012
The Kefaya Movement: A Case Study of a Grassroots Reform Initiative OPEN ACCESS 2008
Kicking the Carbon Habit: Global Warming and the Case for Renewable and Nuclear Energy 2006
Knowledge-Based Economies and Basing Economies on Knowledge: Skills a Missing Link in GCC Countries OPEN ACCESS 2013
Labor and the Locavore: The Making of a Comprehensive Food Ethic 2014
The Labyrinth of Technology: A Preventive Technology and Economic Strategy as a Way Out 2000
Land Between the Lakes 1971
Law, Privacy and Surveillance in Canada in the Post-Snowden Era OPEN ACCESS 2015
Leading Change in a Web 2.1 World: How ChangeCasting Builds Trust, Creates Understanding, and Accelerates Organizational Change 2010
Learning from Experience: Volume I: Lessons from the Submarine Programs of the United States, United Kingdom, and Australia OPEN ACCESS 2011
Learning from Experience: Volume II: Lessons from the U.S. Navy's Ohio, Seawolf, and Virginia Submarine Programs OPEN ACCESS 2011
Learning from Experience: Volume III: Lessons from the United Kingdom's Astute Submarine Program OPEN ACCESS 2011
Learning from Experience: Volume IV: Lessons from Australia's Collins Submarine Program OPEN ACCESS 2011
Learning Large Lessons: The Evolving Roles of Ground Power and Air Power in the Post-Cold War Era OPEN ACCESS 2007
Learning Native Wisdom: What Traditional Cultures Teach Us about Subsistence, Sustainability, and Spirituality 2008
Lessons from the Army’s Future Combat Systems Program OPEN ACCESS 2012
Letterboxed: The Evolution of Widescreen Cinema 2011
A Lever Long Enough: A History of Columbia's School of Engineering and Applied Science Since 1864 2014
Leveraging Observations of Security Force Assistance in Afghanistan for Global Operations OPEN ACCESS 2013
License Plate Readers for Law Enforcement: Opportunities and Obstacles OPEN ACCESS 2014
Livestock/Deadstock: Working with Farm Animals from Birth to Slaughter 2010
Living in the Labyrinth of Technology 2005
Local Environmental Movements 2008
Locomotive to Aeromotive: Octave Chanute and the Transportation Revolution 2011
Logic and Automata: History and Perspectives OPEN ACCESS 2008
The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age 2013
London: Water and the Making of the Modern City 2013
The Long Shadow of 9/11: America's Response to Terrorism OPEN ACCESS 2011
Loosening the Bonds: Mid-Atlantic Farm Women, 1750-1850 1986
Macroanalysis: Digital Methods and Literary History 2013
Making a Green Machine: The Infrastructure of Beverage Container Recycling 2011
Man and Water: The Social Sciences in Management of Water Resources 1974
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 4: Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions OPEN ACCESS 2013
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6: Contractor Motivations and Anticipating Breaches OPEN ACCESS 2014
A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system 2013
Managing Information Risk: A Director's Guide 2009
Managing Information Security Breaches: Studies from Real Life 2010
Managing Information Security Breaches: Studies from real life 2014
Managing IT in a Downturn: A Pocket Guide 2008
Managing the Infosphere: Governance, Technology, and Cultural Practice in Motion 2008
Mankind Beyond Earth: The History, Science, and Future of Human Space Exploration 2012
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar OPEN ACCESS 2014
Mass Destruction: The Men and Giant Mines That Wired America and Scarred the Planet 2009
Mastering the Ultimate High Ground: Next Steps in the Military Uses of Space OPEN ACCESS 2003
Math Bytes: Google Bombs, Chocolate-Covered Pi, and Other Cool Bits in Computing 2014
Math You Can't Use: Patents, Copyright, and Software 2006
Matrices, Moments and Quadrature with Applications 2010
Measuring your IT: Identifying the metrics that matter 2012
Medical Professionalism in the New Information Age 2010
Mercury and the Making of California: Mining, Landscape, and Race, 1840–1890 2013
Metallurgy: Understanding How, Learning Why: Studies in Honor of James D. Muhly 2011
Mileage-Based User Fees for Transportation Funding: A Primer for State and Local Decisionmakers OPEN ACCESS 2012
Military Enlistment of Hispanic Youth: Obstacles and Opportunities OPEN ACCESS 2009
Milk: A Local and Global History 2011
Mississippi Harvest: Lumbering in the Longleaf Pine Belt, 1840-1915 1962
Mobile Screens: The Visual Regime of Navigation OPEN ACCESS 2012
Mobile Security: A Pocket Guide 2009
Modeling, Simulation, and Operations Analysis in Afghanistan and Iraq: Operational Vignettes, Lessons Learned, and a Survey of Selected Efforts OPEN ACCESS 2014
Modeling with Data: Tools and Techniques for Scientific Computing 2009
Modern Anti-windup Synthesis: Control Augmentation for Actuator Saturation 2011
Modernization and the Japanese Factory 1976
My Country, Mine Country: Indigenous People, mining and development contestation in remote Australia OPEN ACCESS 2013
My Fair Ladies: Female Robots, Androids, and Other Artificial Eves 2015
The Myth of Digital Democracy 2009
National Guard Special Forces: Enhancing the Contributions of Reserve Component Army Special Operations Forces OPEN ACCESS 2012
National Insecurity: U.S. Intelligence After the Cold War 2000
National Security and United States Policy Toward Latin America 1987
Naval Strategy and National Security: An "International Security" Reader 1988
The Need for Speed: A New Framework for Telecommunications Policy for the 21st Century 2013
The Net Effect: Romanticism, Capitalism, and the Internet 2011
Networked Forces in Stability Operations: 101st Airborne Division, 3/2 and 1/25 Stryker Brigades in Northern Iraq OPEN ACCESS 2007
Neural Networks and Animal Behavior: 2005
New Approaches to Defense Inflation and Discounting OPEN ACCESS 2013
A New Idea Each Morning: How food and agriculture came together in one international organisation OPEN ACCESS 2013
The New Invisible College: Science for Development 2008
New Natures: Joining Environmental History with Science and Technology Studies 2013
A New Tool for Assessing Workforce Management Policies Over Time: Extending the Dynamic Retention Model OPEN ACCESS 2013
The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters 2007
The Next Wave: Using Digital Technology to Further Social and Political Innovation 2011
Nine Steps to Success: An ISO27001:2013 Implementation Overview 2013
No One of Us is as Strong as All of Us: Services, catalogs and portfolios 2012
Nobody’s Business: Twenty-First Century Avant-Garde Poetics 2013
Nonnegative and Compartmental Dynamical Systems 2010
Normal Accidents: Living with High Risk Technologies (Updated) 1999
Note-by-Note Cooking: The Future of Food 2014
Nothing Less than Victory: Decisive Wars and the Lessons of History 2010
The NSA Report: Liberty and Security in a Changing World 2014
Nuclear Politics: Energy and the State in the United States, Sweden, and France 1990
Number-Crunching: Taming Unruly Computational Problems from Mathematical Physics to Science Fiction 2011
Numerical Algorithms for Personalized Search in Self-organizing Information Networks 2010
Nutritionism: The Science and Politics of Dietary Advice 2013
Of Time and the Enterprise: North American Family Farm Management in a Context of Resource Marginality 1982
Off the Network: Disrupting the Digital World OPEN ACCESS 2013
OHSAS 18001 Step by Step: A Practical Guide 2012
Oil Titans: National Oil Companies in the Middle East 2006
On the Edge of Earth: The Future of American Space Power 2001
Once more unto the Breach: Managing information security in an uncertain world 2015
Once more unto the Breach: Managing information security in an uncertain world 2012
Ontario Hydro at the Millennium: Has Monopoly's Moment Passed? 1996
Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule 2003
An Operational Architecture for Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes OPEN ACCESS 2014
An Operational Process for Workforce Planning OPEN ACCESS 2004
Optimization: A Theory of Necessary Conditions: A Theory of Necessary Conditions 1976
Optimization Algorithms on Matrix Manifolds 2008
Options for Meeting the Maintenance Demands of Active Associate Flying Units OPEN ACCESS 2008
Oral Tradition and the Internet: Pathways of the Mind 2012
The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces OPEN ACCESS 2014
An Outline of Strategies for Building an Innovation System for Knowledge City OPEN ACCESS 2012
Outsourcing IT: A governance guide 2009
Overpotential: Fuel Cells, Futurism, and the Making of a Power Panacea 2012
Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits OPEN ACCESS 2013
PCI DSS: A Pocket Guide 2011
PCI DSS: A Pocket Guide - 3rd edition 2013
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance: A practical guide to implementing and maintaining compliance 2011
Penaid Nonproliferation: Hindering the Spread of Countermeasures Against Ballistic Missile Defenses OPEN ACCESS 2014
Penetration Testing: Protecting Networks and Systems 2012
Penetration Testing Services Procurement Guide 2014
Philosophical Perspectives on Bioethics 1996
The Pion-Nucleon System 1973
The Piri Reis Map of 1513 2000
Plastic Reality: Special Effects, Technology, and the Emergence of 1970s Blockbuster Aesthetics 2015
Poison in the Well: Radioactive Waste in the Oceans at the Dawn of the Nuclear Age 2008
Police Department Investments in Information Technology Systems: Challenges Assessing Their Payoff OPEN ACCESS 2014
A Policy Analysis of Reserve Retirement Reform OPEN ACCESS 2013
Politics and Nuclear Power: Energy Policy in Western Europe 1986
Portfolio Optimization by Means of Multiple Tandem Certainty-Uncertainty Searches: A Technical Description OPEN ACCESS 2013
Portfolio-Analysis Methods for Assessing Capability Options OPEN ACCESS 2008
Post-Traumatic Stress Disorder and the Earnings of Military Reservists OPEN ACCESS 2013
Power at Cost: Ontario Hydro and Rural Electrification, 1911-1958 1992
The Power of Knowledge: How Information and Technology Made the Modern World 2014
The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team 2013
The Power of the Internet in China: Citizen Activism Online 2009
Power over Peoples: Technology, Environments, and Western Imperialism, 1400 to the Present 2010
Power, Speed, and Form: Engineers and the Making of the Twentieth Century 2006
Practical IT Service Management: A concise guide for busy executives 2014
Practical IT Service Management: A Concise Guide for Busy Executives 2008
Pragmatic Application of Service Management: The Five Anchor Approach 2014
Pre-Deployment Stress, Mental Health, and Help-Seeking Behaviors Among Marines OPEN ACCESS 2014
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations OPEN ACCESS 2013
Preparing and Training for the Full Spectrum of Military Challenges: Insights from the Experiences of China, France, the United Kingdom, India, and Israel OPEN ACCESS 2009
Procuring Penetration Testing Services 2014
Professionalism in the Information and Communication Technology Industry OPEN ACCESS 2013
Programming as if People Mattered: Friendly Programs, Software Engineering, and Other Noble Delusions 1991
Project Retrosight: Understanding the returns from cardiovascular and stroke research: The Policy Report OPEN ACCESS 2011
Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review OPEN ACCESS 2014
Promoting Online Voices for Countering Violent Extremism OPEN ACCESS 2013
Protecting Emergency Responders Volume 2: Community Views of Safety and Health Risks and Personal Protection Needs OPEN ACCESS 2003
Protecting Emergency Responders, Volume 4: Personal Protective Equipment Guidelines for Structural Collapse Events OPEN ACCESS 2006
The Public Eye: Television and the Politics of Canadian Broadcasting, 1952-1968 1979
Public Service Liberalism: Telecommunications and Transitions in Public Policy 1991
Qatar's School Transportation System: Supporting Safety, Efficiency, and Service Quality OPEN ACCESS 2012
Quantitative Techniques for Decision Making in Construction 2004
The Quantum Age of IT: Why everything you know about IT is about to change 2012
Radical Islam in East Africa OPEN ACCESS 2009
Radio Utopia: Postwar Audio Documentary in the Public Interest 2011
Raise: What 4-H Teaches Seven Million Kids and How Its Lessons Could Change Food and Farming Forever 2014
RAND and the Information Evolution: A History in Essays and Vignettes OPEN ACCESS 2008
The RAND Security Cooperation Prioritization and Propensity Matching Tool OPEN ACCESS 2013
Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy OPEN ACCESS 2012
Readiness Reporting for an Adaptive Army OPEN ACCESS 2013
Reading Machines: Toward an Algorithmic Criticism 2011
Reading Writing Interfaces: From the Digital to the Bookbound 2014
Rebuilding the News: Metropolitan Journalism in the Digital Age 2013
Récoltes des forêts publiques au Québec et en Ontario, 1840-1900 1999
Reconstruction Under Fire: Case Studies and Further Analysis of Civil Requirements OPEN ACCESS 2010
Redefining Information Warfare Boundaries for an Army in a Wireless World OPEN ACCESS 2013
Reducing Long-Term Costs While Preserving a Robust Strategic Airlift Fleet: Options for the Current Fleet and Next-Generation Aircraft OPEN ACCESS 2013
Reducing the Cultivation of Opium Poppies in Southern Afghanistan OPEN ACCESS 2015
Resilient Thinking: Protecting Organisations in the 21st Century 2012
Resource Allocation in Agricultural Research 1971
Rethinking Counterinsurgency: RAND Counterinsurgency Study--Volume 5 OPEN ACCESS 2008
Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism 2014
A Review of Research on Problematic Internet Use and Well-Being: With Recommendations for the U.S. Air Force OPEN ACCESS 2015
Reviewing IT in Due Diligence: Are you buying an IT asset or liability 2015
A Revolution Down on the Farm: The Transformation of American Agriculture since 1929 2008
Risk Assessment for Asset Owners 2007
A Risk Assessment Methodology and Excel Tool for Acquisition Programs OPEN ACCESS 2013
Risks, Dangers, and Rewards in the Nova Scotia Offshore Fishery 1995
River Republic: The Fall and Rise of America's Rivers 2012
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT 2012
Rushed to Judgment: Talk Radio, Persuasion, and American Political Behavior 2002
Russia and the Information Revolution OPEN ACCESS 2005
Samuel de Champlain before 1604: Des Sauvages and other Documents Related to the Period 2010
The Sanitary City: Environmental Services in Urban America from Colonial Times to the Present 2008
Satellite Anomalies: Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators OPEN ACCESS 2014
Scenes of Projection: Recasting the Enlightenment Subject 2015
Science and Technology Policy in the United States: Open Systems in Action 2006
Science and the Navy: The History of the Office of Naval Research 1990
The Science of War: Defense Budgeting, Military Technology, Logistics, and Combat Outcomes 2009
Scientific Management in Action: Taylorism at Watertown Arsenal, 1908-1915 1985
Securing America's Passenger-Rail Systems OPEN ACCESS 2007
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud 2012
Security and Profit in China's Energy Policy: Hedging Against Risk 2013
Security Testing Handbook for Banking Applications 2009
Security: The Human Factor 2010
Seed Testing: Principles and Practices 2012
Selection Management: For Systems and Services 2012
Selling Information Security to the Board: A Primer 2010
Service Level Agreements: A legal and practical guide 2010
Shaping the Next One Hundred Years: New Methods for Quantitative, Long-Term Policy Analysis OPEN ACCESS 2003
Signal Traffic: Critical Studies of Media Infrastructures 2015
Silence, Screen, and Spectacle: Rethinking Social Memory in the Age of Information 2014
Silent Film Sound 2004
The Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue 2011
A Sixty-Year Timeline of the Air Force Maui Optical and Supercomputing Site OPEN ACCESS 2013
Slow Food: The Case for Taste 2001
Small Tech: The Culture of Digital Tools 2008
Small Unmanned Aircraft: Theory and Practice 2012
Smart Machines: IBM's Watson and the Era of Cognitive Computing 2013
SMART TRASH: Study on RFID tags and the recycling industry OPEN ACCESS 2012
A Social Strategy: How We Profit from Social Media 2014
Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings 2011
The Soil and Health: A Study of Organic Agriculture 1947
Soldier-Portable Battery Supply: Foreign Dependence and Policy Options OPEN ACCESS 2014
Sonic Persuasion: Reading Sound in the Recorded Age 2011
The Souls of Cyberfolk: Posthumanism as Vernacular Theory 2005
Sound Technology and the American Cinema: Perception, Representation, Modernity 2000
Sound Wormy: Memoir of Andrew Gennett, Lumberman 2002
Sources of Weapon System Cost Growth: Analysis of 35 Major Defense Acquisition Programs OPEN ACCESS 2008
Sourcing and Global Distribution of Medical Supplies OPEN ACCESS 2014
Space as a Strategic Asset 2007
Space Weapons Earth Wars OPEN ACCESS 2002
Special Effects: Still in Search of Wonder 2002
Specialty Payment Model Opportunities and Assessment: Oncology Simulation Report OPEN ACCESS 2015
Squeezed: What You Don't Know About Orange Juice 2009
The Star as Icon: Celebrity in the Age of Mass Consumption 2008
The Star Wars Controversy: An "International Security" Reader: An International Security Reader 1986
State-Level Changes in Energy Intensity and Their National Implications OPEN ACCESS 2003
Status Update: Celebrity, Publicity, and Branding in the Social Media Age 2013
Steel, Ships and Men: Cammell Laird and Company 1824-1993 1998
Stereoscopic Cinema and the Origins of 3-D Film, 1838-1952 2007
Strategic Defenses: Two Reports by the Office of Technology Assessment 1986
Strategic Information Warfare: A New Face of War OPEN ACCESS 1996
Strategically Aligned Family Research: Supporting Soldier and Family Quality of Life Research for Policy Decisonmaking OPEN ACCESS 2013
Strategy-Policy Mismatch: How the U.S. Army Can Help Close Gaps in Countering Weapons of Mass Destruction OPEN ACCESS 2014
Street Smart: Intelligence Preparation of the Battlefield for Urban Operations OPEN ACCESS 2002
Sugar Water: Hawaii's Plantation Ditches 1996
Suitability of Missions for the Air Force Reserve Components OPEN ACCESS 2014
Summa Technologiae 2013
Support for the 21st-Century Reserve Force: Insights to Facilitate Successful Reintegration for Citizen Warriors and Their Families OPEN ACCESS 2013
Supporting Employers in the Reserve Operational Forces Era: Appendixes OPEN ACCESS 2013
Supporting Employers in the Reserve Operational Forces Era: Are Changes Needed to Reservists’ Employment Rights Legislation, Policies, or Programs? OPEN ACCESS 2013
A Survey of Agricultural Economics Literature V4: Agriculture in Economic Development 1940s to 1990s 1992
Sustaining Key Skills in the UK Military Aircraft Industry OPEN ACCESS 2010
Sustaining U.S. Nuclear Submarine Design Capabilities OPEN ACCESS 2007
SWANSON on Internal Auditing: Raising the Bar 2010
Syntony and Spark: The Origins of Radio 1985
Syria as an Arena of Strategic Competition OPEN ACCESS 2013
Tantalisingly Close: An Archaeology of Communication Desires in Discourses of Mobile Wireless Media OPEN ACCESS 2012
The Tao of Open Source Intelligence 2015
Technological Turf Wars: A Case Study of the Computer Antivirus Industry 2009
Technology in Early America: Needs and Opportunities for Study 1966
Technology in Postwar America: A History 2007
Telecommunications Development in Asia 2008
Telecommunications Liberalization on Two Sides of the Atlantic 2001
The Television Will Be Revolutionized, 2nd edition 2014
Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation 2013
Terra Nostra: The Stories Behind Canada’s Maps 2006
Theaters of Time and Space: American Planetaria, 1930-1970 2005
Thinking About America's Defense: An Analytical Memoir OPEN ACCESS 2008
Three Views of Logic: Mathematics, Philosophy, and Computer Science 2014
Through Mobility We Conquer: The Mechanization of U.S. Cavalry 2006
To Forgive Design: Understanding Failure 2012
To Reach the High Frontier: A History of U.S. Launch Vehicles 2002
Tobacco Culture: Farming Kentucky's Burley Belt 1998
The Tools of Owatatsumi: Japan’s Ocean Surveillance and Coastal Defence Capabilities OPEN ACCESS 2015
Topics in Quaternion Linear Algebra 2014
Toward an Evolutionary Regime for Spectrum Governance: Licensing or Unrestricted Entry? 2006
Toward Integrated DoD Biosurveillance: Assessment and Opportunities OPEN ACCESS 2013
Towards a competitive European Internet industry: A socio-economic analysis of the European Internet industry and the Future Internet Public-Private Partnership OPEN ACCESS 2012
Toxic Airs: Body, Place, Planet in Historical Perspective 2014
The Transformation of the World: A Global History of the Nineteenth Century 2014
Transient Images: Personal Media in Public Frameworks 2011
Trapped in the Net: The Unanticipated Consequences of Computerization 1997
The True Cost of Information Security Breaches and Cyber Crime 2013
Turing's Man: Western Culture in the Computer Age 1984
The Turkey: An American Story 2006
Turning Heads and Changing Minds: Transcending IT Auditor Archetypes 2013
Twentieth-Century Shore-Station Whaling in Newfoundland and Labrador 2005
Two-Factor Authentication 2015
The Ultimate Book of Saturday Science: The Very Best Backyard Science Experiments You Can Do Yourself 2012
Umami: Unlocking the Secrets of the Fifth Taste 2014
Unconventional Fossil-Based Fuels: Economic and Environmental Trade-Offs OPEN ACCESS 2008
Underkill: Scalable Capabilities for Military Operations amid Populations OPEN ACCESS 2009
Understanding Commanders' Information Needs for Influence Operations OPEN ACCESS 2009
Understanding Forfeitures: An Analysis of the Relationship Between Case Details and Forfeiture Among TEOAF High-Forfeiture and Major Cases OPEN ACCESS 2009
Understanding Iran OPEN ACCESS 2009
Understanding the Cost and Quality of Military-Related Education Benefit Programs OPEN ACCESS 2013
Understanding the Global Energy Crisis OPEN ACCESS 2014
Understanding Why a Ground Combat Vehicle That Carries Nine Dismounts Is Important to the Army OPEN ACCESS 2013
Unfolding the Future of the Long War: Motivations, Prospects, and Implications for the U.S. Army OPEN ACCESS 2008
Uranium Frenzy: Saga of the Nuclear West 2002
The U.S. Combat Aircraft Industry, 1909-2000: Structure, Competition, Innovation OPEN ACCESS 2003
U.S. Competitiveness in Science and Technology OPEN ACCESS 2008
U.S. Military Information Operations in Afghanistan: Effectiveness of Psychological Operations 2001-2010 OPEN ACCESS 2012
U.S. Navy Employment Options for Unmanned Surface Vehicles (USVs) OPEN ACCESS 2013
Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base OPEN ACCESS 2013
Using EPIC to Find Conflicts, Inconsistencies, and Gaps in Department of Defense Policies OPEN ACCESS 2013
Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources OPEN ACCESS 2012
Using Social Media to Gauge Iranian Public Opinion and Mood After the 2009 Election OPEN ACCESS 2012
Using the Steel-Vessel Material-Cost Index to Mitigate Shipbuilder Risk OPEN ACCESS 2008
The Vandana Shiva Reader 2014
Venture Capital and Strategic Investment for Developing Government Mission Capabilities OPEN ACCESS 2014
Virtual Collaboration for a Distributed Enterprise OPEN ACCESS 2013
The Virtues of Ignorance: Complexity, Sustainability, and the Limits of Knowledge 2008
Visions of Law Enforcement Technology in the Period 2024-2034: Report of the Law Enforcement Futuring Workshop OPEN ACCESS 2015
Warhogs: A History of War Profits in America 1997
Wave Propagation: From Electrons to Photonic Crystals and Left-Handed Materials 2008
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely 2015
Weighting Evidence in Language and Literature: A Statistical Approach 1974
When Computers Were Human 2005
Where the Money Goes: Understanding Litigant Expenditures for Producing Electronic Discovery OPEN ACCESS 2012
Who's #1?: The Science of Rating and Ranking 2012
Why Air Forces Fail: The Anatomy of Defeat 2006
Wind Wizard: Alan G. Davenport and the Art of Wind Engineering 2013
Wing Theory 1990
Wingless Flight: The Lifting Body Story 2002
Women in Nineteenth-Century Russia: Lives and Culture OPEN ACCESS 2012
Workplace Wellness Programs: Services Offered, Participation, and Incentives OPEN ACCESS 2014
Worlds Without End: The Many Lives of the Multiverse 2014
Worse Than a Monolith: Alliance Politics and Problems of Coercive Diplomacy in Asia 2011
You've Got Dissent! Chinese Dissident Use of the Internet and Beijing's Counter-Strategies OPEN ACCESS 2002