| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910571749303321 |
|
|
Autore |
Simonetta Alberto Mario |
|
|
Titolo |
Short history of Biology from the origins to the 20th Century / / Alberto Mario Simonetta |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Firenze : , : Firenze University Press, , 2003 |
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (483 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
The book tells the story of the development of both knowledge and theories about the living organisms since Antiquity until the beginning of the 20th century. It also endeavours to link the advances in sciences and the events in the life of scientists with the historical and social framework within which they lived. When possible some hints have been provided about the personalities of the scientists themselves. It is especially meant both for biologists and naturalists, but an attempt has been made to make it interesting reading also for any layman with an interest in history and sciences. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910220091503321 |
|
|
Autore |
Paul Christopher <1971-> |
|
|
Titolo |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / / Christopher Paul, Isaac R. Porche III, Elliot Axelband |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Santa Monica, California : , : RAND Corporation, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-8330-8800-9 |
0-8330-8802-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (140 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cyberspace - Security measures - United States - Planning |
Computer networks - Security measures - United States - Planning |
Cyberterrorism - United States - Prevention - Planning |
Information warfare - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986 |
CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force |
|
|
|
|
|
|
|
|
|
|
|
Structure; U.S. Army Cyber Forces; U.S. Cyber Command |
CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy |
CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs |
How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF |
Recognize the Precarious Value of Cyber Forces and Support Them Accordingly |
|
|
|
|
|
|
Sommario/riassunto |
|
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces. |
|
|
|
|
|
|
|
| |