Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Operations Other Than War (OOTW): The Technological Dimension
"The workshop sought insights into the process of determining what technologies are required for OOTW. The group also examined the complexities of introducing relevant technologies and discussed general and specific OOTW technologies and devices. This workshop was a departure from its predecessors in that the agenda was rich in presentations, with relatively little time available for detailed discussions. Because of its training and culture, the U.S. military has been somewhat reluctant to engage in OOTW. Nevertheless, such operations are becoming more common, in many cases subsuming traditional military missions. There are many reasons for this increased involvement. Some nations and groups tend to avoid direct confrontation with the U.S. military, but they still find ways to challenge the U.S. directly or indirectly. In other cases, internal problems in foreign countries cause conditions that U.S. policy makers cannot ignore. These can include, for example, loss of government control and resulting internal violence (as in Rwanda) or concerns about the possible spill-over of ongoing hostilities (as in the former Yugoslavia). In such cases, OOTW is seen as a way to lessen the effects of war or prevent it altogether. Further, U.S. forces are increasingly being tasked to respond to other non-traditional military missions (such as disaster relief or restoration of democracy)."
National Defense University. Institute for National Strategic Studies
1995-11
-
Acquisition Strategy Guide, Second Edition
"The purpose of this Guide is to provide, in a single source, information that Program Managers (PM) should find useful in structuring, developing, and executing an acquisition strategy. A process for developing and executing an acquisition strategy is provided together with criteria for evaluating a proposed strategy. However, this Guide alone will not provide the PM with a definitive acquisition strategy for a specific program. Well informed, educated, and innovative applications and judgments concerning the particular mission need are necessary to structure a successful acquisition strategy. Program Managers should continue to seek guidance, data, and assistance from available sources as they prepare and revise their acquisition strategy."
Defense Systems Management College
McDaniel, Norman A.; Bull, Norman S.; Cooper, Carleton R.
1995-11
-
Constitutionality of Awarding Historic Preservation Grants to Religious Properties: Memorandum Opinion for the Solicitor, Department of the Interior [October 31, 1995]
"Establishment Clause of awarding government historic preservation grants to churches and other religious properties. In particular, and as we discussed earlier, we have considered whether the Supreme Court's recent decision in Rosenberger v. Rector & Visitors, 515 U.S. 819 (1995), directly addresses the particular question you have raised. As discussed below, the Rosenberger decision, which deals with a form of government aid to religion significantly different from that at issue here, does not control the case you have presented. Accordingly, we have no occasion here to fully analyze the Rosenberger decision, nor to predict how it might apply in other contexts. Rather, our analysis is guided by Supreme Court case law developed prior to Rosenberger. We conclude that a reviewing court, applying current precedent, likely would hold that making historic preservation grants to churches and other pervasively sectarian properties is inconsistent with the Establishment Clause."
United States. Department of Justice. Office of Legal Counsel
1995-10-31
-
Active Fiber Optic Technologies Used As Tamper-Indicating Devices
"The Safeguards Seals Evaluation Program is considering new fiber optic active seal technologies (AST) that can be used at DOE facilities. The goal is to investigate tamper-indicating devices (TID) that can be used to monitor secured containers within vaults while personnel remain outside the vault area. Such a system would allow minimal required access into vaults to verify container TID integrity while ensuring container content accountability. The TID concepts that hold the most promise and keep cost factors down are fiber optic and radio frequency technologies. Four existing manufactured technologies were considered and tested."
Sandia National Laboratories
Horton, Patrick R. V.; Waddoups, Ivan G.
1995-11
-
Executive Summary and Guide to Final Report: Advisory Committee on Human Radiation Experiments
"On January 15, 1994, President Clinton appointed the Advisory Committee on Human Radiation Experiments. The President created the Committee to investigate reports of possibly unethical experiments funded by the government decades ago. The members of the Advisory Committee were fourteen private citizens from around the country: a representative of the general public and thirteen experts in bioethics, radiation oncology and biology, nuclear medicine, epidemiology and biostatistics, public health, history of science and medicine, and law. […] Some of the experiments the Committee was asked to investigate, and particularly a series that included the injection of plutonium into unsuspecting hospital patients, were of special concern to Secretary of Energy Hazel O'Leary. Her department had its origins in the federal agencies that had sponsored the plutonium experiments. These agencies were responsible for the development of nuclear weapons and during the Cold War their activities had been shrouded in secrecy. […] The controversy surrounding the plutonium experiments and others like them brought basic questions to the fore: How many experiments were conducted or sponsored by the government, and why? How many were secret? Was anyone harmed? What was disclosed to those subjected to risk, and what opportunity did they have for consent? By what rules should the past be judged? What remedies are due those who were wronged or harmed by the government in the past? How well do federal rules that today govern human experimentation work? What lessons can be learned for application to the future? Our Final Report provides the details of the Committee's answers to these questions. This Executive Summary presents an overview of the work done by the Committee, our findings and recommendations, and the contents of the Final Report."
United States. Department of Energy. Assistant Secretary for Environment, Safety, and Health
1995-10-24
-
Executive Order 12978: Blocking Assets and Prohibiting Transactions with Significant Narcotics Traffickers
"The actions of significant foreign narcotics traffickers centered in Colombia, and the unparalleled violence, corruption, and harm that they cause in the United States and abroad, constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and hereby declare a national emergency to deal with that threat. Except to the extent provided in section 203(b) of IEEPA (50 U.S.C. 1702(b)) and in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date, I hereby order blocked all property and interests in property that are or hereafter come within the United States."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1995-10-21
-
Presidential Decision Directive: International Organized Crime
From the Document: "The growth in international communications and transportation has resulted in many benefits. It has brought the world closer together. Unfortunately, it has also facilitated criminal elements so that they no longer threaten just their own country or region. The scale and extent of international organized criminal activities has become complex, global and threatening. [...] Their corrosive activities threaten all governments, including our own. International organized criminal enterprises, therefore, are not only a law enforcement problem, they are a threat to national security. Acting, therefore, consistent with my constitutional obligations, I hereby direct an enhanced and integrated Federal government response to international organized crime as a matter of great priority."
United States. White House Office; National Security Council (U.S.)
1995-10-21
-
Strategic Plans, Joint Doctrine and Antipodean Insights
From the thesis abstract: "This is the second in an analytical series on joint issues. It follows the authors' U.S. Department of Defense Strategic Planning: The Missing Nexus, in which they articulated the need for more formal joint strategic plans. This essay examines the effect such plans would have on joint doctrine development and illustrates the potential benefits evident in Australian defense planning. Doctrine and planning share an iterative development process. The common view is that doctrine persists over a broader time frame than planning and that the latter draws on the former for context, syntax, even format. In truth the very process of planning shapes new ways of military action. As the environment for that action changes, planners address new challenges, and create the demand for better methods of organizing, employing and supporting forces. Evolutionary, occasionally revolutionary, doctrinal changes result. The authors of this monograph explore the relationship between strategic planning and doctrine at the joint level. They enter the current debate over the scope and authority of joint doctrine from a joint strategic planning perspective. In their view, joint doctrine must have roots, and those roots have to be planted firmly in the strategic concepts and plans developed to carry out the National Military Strategy. Without the fertile groundwork of strategic plans, the body of joint doctrine will struggle for viability."
Army War College (U.S.). Strategic Studies Institute
Lovelace, Douglas C.; Young, Thomas-Durell
1995-10-20
-
Executive Order 12977: Interagency Security Committee
This Executive Order establishes the Interagency Security Committee as a permanent body to address continuing government-wide security for Federal facilities. The order contains a list of all of the agencies which will have a representative on the committee, specifies who will chair the committee, authorizes the establishment of interagency working groups and lays out the responsibilities of the new committee.
United States. Office of the Federal Register
Clinton, Bill, 1946-
1995-10-19
-
Public Law 104-321: Joint Resolution Granting the Consent of Congress to the Emergency Management Assistance Compact
Joint Resolution granting the consent of Congress to the Emergency Management Assistance Compact.
United States. Government Printing Office
1995-10-19
-
U.S. Marine Corps Maritime Prepositioning Force Enhancement Program
"This document evolved from a 1995 In Process Review to the Director to support the Director's responsibility to brief the status of MPFE to all Unified Commanders. This evaluation report is the follow-up to that briefing. In gathering data, we reviewed key planning documents, such as the Defense Planning Guidance, Bottom up Review, and the Mobility Requirements Study to ascertain the general guidance and tasking provided to the Unified Commanders. We then met with the Joint Staff, Navy, and Marine Corps headquarters personnel in the National Capital Region and with the staffs or commanders of 4 of the 5 geographic Unified Commands and 12 of their 16 Component Commands. The purpose of our meetings and interviews was to validate the costs and availability of equipment and to interpret the priority assigned to the MPFE Program by the Unified Commanders."
United States. Department of Defense. Office of the Inspector General
1995-10-17
-
A/S Raphel's October 4 Meeting with Assef All on Afghanistan, October 13, 1995
"Pakistan Foreign Minister Assef All tells U.S. Assistant Secretary of State for South Asian Affairs Robin Raphel that 'the main Pakistani message to the [Rabbani] opposition was to unite against the Kabul regime, but not to attack Kabul.' Furthermore, 'All did not deny that Pakistan had significant contact with and gave some support to the Taliban. However, he said that little outside material support was necessary as the Tall ban [sic] had widespread support throughout the Pashtun areas of Afghanistan.'"
United States. Department of State
1995-10-13
-
18th National Information Systems Security Conference Proceedings: Proceedings Volume 1: Making Security Real
"The National Computer Security Center (NCSC) and the Computer Systems Laboratory (CSL) are pleased to welcome you to the Eighteenth National Information Systems Security Conference. The new conference name reminds us that information systems, not just computers, must be secure. This year's program, with its theme "Making Security Real," is designed to help you plan for effective use of information security technology and to create security solutions. We believe the conference will stimulate a copious information exchange and promote a solid understanding of today's information security issues and protection strategies. The conference program addresses a wide range of interests from technical research and development projects to user oriented management and administration topics. This year, the program focuses on developing and implementing secure networks, technologies, applications, and policies. Papers and panel sessions address a broad spectrum of network security subjects including: security architecture, internet security, firewalls, multilevel security (MLS) products, and security management. Because the National Information Infrastructure (Nil), and its present backbone--the Internet--are topics of increasing interest, the challenges they present are the subject of many presentations. As in the past, a number of tutorials introduce attendees to a variety of information security topics and project areas. As a new feature this year, we have invited the vendor award recipients to provide product information displays as part of the award ceremony."
National Institute of Standards and Technology (U.S.)
1995-10-13
-
Food and Drug Administration's Discretion to Approve Methods of Detection and to Define the Term 'No Residue' Pursuant to the Federal Food, Drug, and Cosmetic Act: Memorandum Opinion for the Assistant Administrator and General Counself, Environmental Protection Agency, and the General Counsel, Department of Health and Human Services [October 13, 1995]
"This memorandum responds to the Environmental Protection Agency's ('EPA') and the Food and Drug Administration's ('FDA') request for our opinion regarding the FDA's regulations implementing what is known as the 'DES proviso' to the Delaney Clause of the Federal Food, Drug, and Cosmetic Act, 21 U.S.C. §§ 301-393 (the 'Act'). Both agencies have certain responsibilities under the Act, which establishes federal regulatory authority over the safety of food additives, human and animal drugs, certain pesticides, and cosmetics."
United States. Department of Justice. Office of Legal Counsel
1995-10-13
-
Evaluation of the Defense Nuclear Agency's Cooperative Threat Reduction Office
"At the request of the Director, Defense Nuclear Agency, we performed an evaluation at the Defense Nuclear Agency's Cooperative Threat Reduction office. The purpose of the evaluation was to determine the Defense Nuclear Agency's ability to discharge assigned Cooperative Threat Reduction (CTR) program execution responsibilities. Our evaluation concentrated on the efficiency of executing the CTR mission and did not consider the merits or political objectives of the program itself. We interviewed DoD personnel involved in the CTR process but did not speak with personnel from non-DoD agencies."
United States. Department of Defense. Office of the Inspector General
Norton, Carl P.; Come, Joseph W.; Pounds, Nakita
1995-10-12
-
Scope of Treasury Department Purchase Rights with Respect to Financing Initiatives of the U.S. Postal Service: Memorandum for Mary S. Elcano, Vice President and Gerneral Counsel, United States Postal Service [and] Edward S. Knight, General Counsel, Department of the Treasury [October 10, 1995]
"This memorandum responds to the U.S. Postal Service's (USPS) request that this office reconsider and rescind an opinion issued on January 19, 1993, in which we responded to the Department of the Treasury's (Treasury) request for an opinion regarding the statutory relationship between the USPS and Treasury with respect to the USPS's financing initiatives. In the 1993 opinion, we concluded that (1) under 39 U.S.C. § 2006(a), Treasury's failure to purchase a USPS bond issue prior to the scheduled date of sale on the market proposed by USPS does not relieve USPS of further obligation to negotiate with the Treasury towards agreeable terms of sale, or permit USPS to proceed with the market sale as originally scheduled, as long as Treasury has duly declared its 'election' to purchase and continues to negotiate in good faith towards the purchase; and (2) the transfer of the proceeds of a bond offering by the USPS to a trustee for the purpose of having the trustee employ those proceeds to make and use investments to discharge outstanding USPS debt would require the prior approval of the Treasury under the provisions of 39 U.S.C. § 2003."
United States. Department of Justice. Office of Legal Counsel
1995-10-10
-
FM 730: The Infantry Bridge, Appendix J: Urban Operations
Urban operations (UO) are operations planned and conducted in an area of operations (AO) that includes one or more urban areas. An urban area is a topographical complex where man-made construction or high population density is the dominant features. The increasing world population and accelerated growth of cities means that UO in future conflicts will be very likely. UO are often conducted against enemy forces that may be mixed in with the civilian population.
United States. Department of the Army
1995-10-03
-
Executive Order 12975: Protection of Human Research Subjects and Creation of National Bioethics Advisory Commission
"By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: (a) Each executive branch department and agency that conducts, supports, or regulates research involving human subjects shall promptly review the protections of the rights and welfare of human research subjects that are afforded by the department's or agency's existing policies and procedures. In conducting this review, departments and agencies shall take account of the recommendations contained in the report of the Advisory Committee on Human Radiation Experiments."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1995-10-03
-
Counterintelligence
This field manual (FM) provides guidance to commanders, counterintelligence (CI) agents, and analysts. The first four chapters provide information to the commander and staff while the remainder provides the tactics, techniques, and procedures (TTP) required to aggressively identify, neutralize, and exploit foreign intelligence attempts to conduct operations against the United States (US) Army. CI supports Army operations by providing a clear picture of the threat to commands at all echelons and actions required to protect the force from exploitation by foreign intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analysis, and intelligence collection in peace and at all levels of conflict to support command needs. CI supports the total intelligence process by focusing on foreign intelligence collection efforts. CI is designed to provide commanders the enemy intelligence collection situation and targeting information in order to counter foreign intelligence service (FIS) activities. CI is an integral part of the US Army's all-source intelligence capability.
United States. Department of the Army
1995-10-03
-
Marketing Strategy for Wildland Fuel Reduction in Palm Coast, Florida
"Palm Coast, Florida, is a 42,000-acre planned residential community on the east coast of Florida characterized by large areas of intermix wildland/urban interface. A need for wildland fuel hazard mitigation has been identified; however a marketing strategy does not exist for implementation of wildland fuel reduction measures. The purpose of this research was to develop a marketing strategy that identifies acceptable fuel reduction methods and funding options for mitigating the wildfire hazard. Action research methods were used to answer the following questions: 1. Are Palm Coast residents aware of the wildfire hazard in their development? 2. What fuel reduction methods are available for use in Palm Coast? 3. What fuel reduction measures are acceptable to homeowners and lot owners in Palm Coast? 4. Are homeowners and lot owners willing to pay for acceptable fuel reduction measures? 5. If they are willing to pay for fuel reduction measures, what methods for funding a fuel reduction program are preferred? Surveys of lot owners and homeowners in selected portions of Palm Coast were performed to solicit their responses to questions designed to answer research questions one, three, four, and five. Research question two was answered by a review of the literature."
National Fire Academy
Kuypers, Mike
1995-10
-
AF Policy Directive 16-11: International Technology Transfer and Security Controls
The Air Force identifies and continually evaluates technology critical to the warfighting success of its mission, for its criticality, and to protect from exploitation and or export to unauthorized recipients. The Air Force continuously reviews critical technologies, international export policies and procedures to protect warfighting technology and to identify technology that is no longer critical to our nation's security, economic, and political interests. This directive implements DoD 2040.2, International Transfers of Technology, Goods, Services, and Munitions, the Export Administration Act (EAA) of 1979 as amended (Public Law 96-72), and the Arms Export Control Act (AECA) as amended (Public Law 94-329). This directive applies to the commercial export of defense articles and services, classified military information, dual use technology, and to technical data as described in the International Traffic in Arms Regulation (ITAR). (Note: Exports of US classified military information must comply with the National Policy and Procedures for the Disclosure of classified military Information to Foreign Governments and International Organizations (NDP-1.) This directive also applies to unclassified information containing distribution statements B,C,D,E,F, or X as defined in AFI 61-204, Disseminating Scientific and Technical Information. This publication is available digitally on the SAF/AAD WWW site at: http://afpubs.hq.af.mil.
United States. Department of the Air Force
1995-10-01
-
Tokyo Subway Sarin Incident: Emergency Medical Response by St. Luke's International Hospital
"The following article has been translated by LLIS.gov with the full consent of its authors and is meant as a public service to the Lessons Learned Information Sharing community. Text enclosed in brackets indicates comments added by the translator for clarification. All photos and images have been omitted. A full citation is provided at the end of the translation. Medical responses to disasters vary greatly depending on the nature and scope of the incident. In a large-scale natural disaster, such as the Great Hanshin-Awaji Earthquake, medical facilities, communication networks, transportation, and lifelines [infrastructure such as electricity, gas, and water] are damaged, hindering effective medical response. The Tokyo Subway Sarin Incident was an unnatural disaster with a more limited scope. In other words, the sarin incident differs from a large-scale natural disaster in that medical facilities, communication networks, transportation, and lifelines remained undamaged. In this paper, we will present what St. Luke's International Hospital (SLIH) did after the Tokyo Subway Sarin Incident and examine some problems that need to be addressed."
Lessons Learned Information Sharing (LLIS)
Ishimatsu, Shinichi, M.D.; Takasu, Nobukatsu, M.D.
1995-10
-
Data Management Issues for Emerging Diseases and New Tools for Managing Surveillance and Laboratory Data
"Two primary data management functions can satisfy the laboratory data demands with multiple requirements in each function. The first function, internal laboratory data management, consists of entering test results and tracking specimens. The second, surveillance, includes gathering data and moving data beyond the electronic files of the laboratory to appropriate sites for analysis. A data management system should be able to perform these functions not only during an outbreak but throughout the period of surveillance as well."
Emerging Infectious Diseases
Martin, Stanley M.; Bean, Nancy H.
1995-10
-
Reducing The Nuclear Danger
The proliferation of weapons of mass destruction represents a major challenge to our national security. Reducing the nuclear danger is one of the primary goals of the United States national security strategy and it is a cornerstone of the Department's vision of the future. To meet this challenge, our Nation draws upon the same foundation of scientific and technological skills that helped bring a successful end to the Gold War. The Department, drawing upon many of the Nation's best and most innovative scientists, provides essential support for the changing global political climate that has guided the Department's adaptation to the new era. Reducing the global nuclear danger, responding with programs that build upon and enhance the strengths of the Department's complex and the National Laboratories, and emphasizing commitments to environment, safety, and health, are the essence of the Department's national security strategy. The nuclear danger is now defined differently than it was just five years ago. Initiatives to prevent nuclear weapons proliferation, improve nuclear reactor safety, safeguard and dispose of nuclear materials and maintain confidence in our nuclear weapons deterrent without nuclear testing have surged to the forefront.
U.S. Atomic Energy Commission
1995-10
-
Advisory Committee on Human Radiation Experiments - Final Report
"On January 15, 1994, President Clinton appointed the Advisory Committee on Human Radiation Experiments. The President created the Committee to investigate reports of possibly unethical experiments funded by the government decades ago. The members of the Advisory Committee were fourteen private citizens from around the country: a representative of the general public and thirteen experts in bioethics, radiation oncology and biology, nuclear medicine, epidemiology and biostatistics, public health, history of science and medicine, and law. President Clinton asked us to deliver our recommendations to a Cabinet-level group, the Human Radiation Interagency Working Group, whose members are the Secretaries of Defense, Energy, Health and Human Services, and Veterans Affairs; the Attorney General; the Administrator of the National Aeronautics and Space Administration; the Director of Central Intelligence; and the Director of the Office of Management and Budget. Some of the experiments the Committee was asked to investigate, and particularly a series that included the injection of plutonium into unsuspecting hospital patients, were of special concern to Secretary of Energy Hazel O'Leary. Her department had its origins in the federal agencies that had sponsored the plutonium experiments. These agencies were responsible for the development of nuclear weapons and during the Cold War their activities had been shrouded in secrecy. But now the Cold War was over."
United States. Department of Energy. Office of Human Radiation Experiments
1995-10
-
Earthquakes: A Teacher's Package for Grades 7-12
"Earthquakes are mystifying events. They are as unpredictable as they are powerful, and not even seismologists fully understand the forces within the Earth that set them in motion. As an educator, you can capitalize on that mysterious appeal to engage your students' interest. Ultimately, however, the purpose of these lessons is to demystify earthquakes, and to counter the fatalism that frequently accompanies ignorance about natural phenomena. Interactive lessons invite students to discover what is known about quakes--the considerable body of knowledge that deals with their causes, the patterns of their occurrence, and what human beings can do to minimize their catastrophic effects on themselves and their communities."
United States. Federal Emergency Management Agency
1995-10
-
Community Policing in Chicago: Year Two
"In April 1993, following a year of planning, Chicago's Alternative Policing Strategy (CAPS) was field-tested in five selected districts before being implemented on a citywide basis. The program was designed to increase the responsiveness and effectiveness of police problem solving by linking these efforts directly to a broad range of city services and involving the public in identifying and seeking solutions to neighborhood problems. Ongoing evaluation of the planning, implementation, and impact of CAPS in these five prototype districts - supported by the Illinois Criminal Justice Information Authority, the National Institute of Justice, the Chicago Community Foundation, and the John D. and Catherine T. MacArthur Foundation - indicates that police and residents have successfully negotiated various effective partnerships and that CAPS has reduced levels of crime and serious neighborhood problems."
National Institute of Justice (U.S.)
1995-10
-
Verifying Nonproliferation Treaties: Obligation, Process, and Sovereignty
"This book examines two of the most critical issues of national security policy: stemming the proliferation of weapons of mass destruction, and verifying international nonproliferation agreements. Contrary to predictions made in the 1970% there are relatively few countries today that either possess or are pursuing nuclear weapons, although there are some pursuing chemical and biological weapons. This general success is a result of several most unusual international treaties-in the cases of chemical and biological weapons, treaties banning such weapons outright, and in the case of nuclear weapons, a treaty limiting the authorized possession of such weapons. If the integrity and effectiveness of these treaties are to be sustained, the question to be addressed is how each party maintains confidence that other parties are abiding by the obligations each has undertaken. It is the character of this verification that has been the subject of considerable debate, with certain critics arguing that real verification is unachievable. Whatever the prospect for successful verification, there is widespread agreement that modern treaties for the purpose of enhancing national security must be verifiable in some fashion; no government should take the good behavior of its adversary as an article of faith."
National Defense University Press
Kessler, J. Christian
1995-10
-
Gender, Stress, and Coping in the U.S. Military: Volume 3 Performance
"Military leaders have long recognized that mission readiness requires both the absence of disease and the presence of mental, physical, and spiritual health. However, little is presently known about the health of military women, particularly as it may be uniquely affected by trauma and war. Such knowledge is essential to meeting the health needs of military women for all mission contingencies. These missions include: peacekeeping and peacemaking activities (e.g., the Sinai MFO Treaty, Somalia); humanitarian aid (care of civilian refugees following the Persian Gulf War; natural and human-made disasters including assistance in Hurricane Andrew, the Los Angeles riots, threats of chemical terrorist attack, and the Oklahoma City bombing); and potential combat. As the number of active duty women increases (approximately 10% in 1995), women are assuming critical positions of responsibility which fully expose them to the hazards of combat and war. The systematic study of the effects of trauma on women's health is important for women in all branches of service. There is a close interplay between performance, health and psychosocial factors in responding to trauma, disaster, and combat. Understanding the gender-specific responses associated with traumatic stress is important for the development of command policy, training scenarios, and medical care procedures. However, little is presently known about how the health of military women may be uniquely affected by trauma and war."
Uniformed Services University of the Health Sciences. Department of Psychiatry
Ursano, Robert J., 1947-; Fullerton, Carol S.; Norwood, Ann E., 1953-
1995-10
-
Introduction to Computer Security: The NIST Handbook
"This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls. It does not describe detailed steps necessary to implement a computer security program, provide detailed implementation procedures for security controls, or give guidance for auditing the security of specific systems. General references are provided at the end of this chapter, and references of 'how-to' books and articles are provided at the end of each chapter in Parts II, III and IV. The purpose of this handbook is not to specify requirements but, rather, to discuss the benefits of various computer security controls and situations in which their application may be appropriate. Some requirements for federal systems are noted in the text. This document provides advice and guidance; no penalties are stipulated. The handbook was written primarily for those who have computer security responsibilities and need assistance understanding basic concepts and techniques. Within the federal government, this includes those who have computer security responsibilities for sensitive systems. For the most part, the concepts presented in the handbook are also applicable to the private sector."
National Institute of Standards and Technology (U.S.)
1995-10