Academic literature on the topic 'Dept of Defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dept of Defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Dept of Defence"
HIROSE, Takeichiryo. "The two-dimensional smoke wind tunnel of the Dept. of Aeronautical Engineering of the National Defence Academy." Journal of the Japan Society for Aeronautical and Space Sciences 36, no. 409 (1988): 100–102. http://dx.doi.org/10.2322/jjsass1969.36.100.
Full textLapidoth, Ruth. "War, Aggression and Self-Defence. By Yoram Dinstein. [Grotius Publications, Sales Dept., P.O. Box 115, Cambridge CB3 9BP, United Kingdom, 1988, xxx + 292 pp., hardbound]." Israel Law Review 23, no. 4 (1989): 557–59. http://dx.doi.org/10.1017/s0021223700009687.
Full textJander, Kai, Lars Braubach, and Alexander Pokahr. "Practical Defense-in-depth Solution for Microservice Systems." Journal of Ubiquitous Systems and Pervasive Networks 11, no. 1 (May 1, 2019): 17–25. http://dx.doi.org/10.5383/juspn.11.01.003.
Full textShasha, Dennis E. "Defense in Depth." Scientific American 286, no. 5 (May 2002): 101. http://dx.doi.org/10.1038/scientificamerican0502-101.
Full textLangerman, Neal. "Defense in Depth." Journal of Chemical Health and Safety 21, no. 1 (January 2014): 43–45. http://dx.doi.org/10.1016/j.jchas.2013.12.004.
Full textGünlük-Senesen, Gülay. "on Deficits, Debt and Defence." Defence and Peace Economics 15, no. 2 (April 2004): 1–2. http://dx.doi.org/10.1080/714866784.
Full textDudzevičiūtė, Gitana, Vida Česnuitytė, and Dalia Prakapienė. "Defence Expenditure–Government Debt Nexus in the Context of Sustainability in Selected Small European Union Countries." Sustainability 13, no. 12 (June 11, 2021): 6669. http://dx.doi.org/10.3390/su13126669.
Full textWu, Guangwei. "ICONE19-43249 PRINCIPLES OF DEFENSE-IN-DEPTH PHILOSOPHY APPLIED IN NPP ENGINEERING MANAGEMENT." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2011.19 (2011): _ICONE1943. http://dx.doi.org/10.1299/jsmeicone.2011.19._icone1943_105.
Full textRanger, Robin. "3. Implications of Missile Defence for Europe: Academic Overview: Past and Present Imperatives for Defences in Depth." Whitehall Papers 55, no. 1 (January 2002): 34–44. http://dx.doi.org/10.1080/02681300209414870.
Full textAnderson, David, Angela Leadbetter, and Bernie Williams. "In defence of the depot clinic." Psychiatric Bulletin 13, no. 4 (April 1989): 177–79. http://dx.doi.org/10.1192/pb.13.4.177.
Full textDissertations / Theses on the topic "Dept of Defence"
Van, Dyk Johannes Jacobus. "An evaluation of the South African Department of Defence's policy on Defence Industrial Participation (DIP) as a defence industrial development mechanism." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/1067.
Full textEccleston, Anthony L., and n/a. "Coordinating information provision in government agencies using an integrated information management strategy." University of Canberra. Information, Language & Culture Studies, 1996. http://erl.canberra.edu.au./public/adt-AUC20060404.123006.
Full textQwele, Gcobani. "An analysis of the role of labour relations practitioners as change agents : a case study on the Department of Defence." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2109.
Full textENGLISH ABSTRACT: Chapter 1 outlines the purpose of the research, provides the background on the way in which LR matters are currently managed and handled in the Department of Defence (DOD), identifies the research problem, and outlines the research design and methodology. Chapter 2 explores the theoretical framework of the principles of labour relations and management of change. The chapter reveals that the principles of labour relations hold persons in management or supervisory positions responsible for managing LR matters, and suggests that LR practitioners should therefore be able to equip them with adequate skills and knowledge of the procedures for dealing with LR matters in the workplace. The chapter also reveals that the principles of the management of change suggest that the employees should be prepared for change; that a change agent, who should create an environment conducive to change through lobbying the support of persons in management and employees for the proposed change, should be identified; and that resistance to change should be identified at an early stage of the change process in order to eliminate it. Change agents are encouraged not to dominate the change process, but rather to facilitate it in order to ensure that the organisation and its employees drive the change process themselves. Chapter 3 explores the objectives of the LR support function as well as the content of LR practices in order to determine the extent to which LR practitioners can become change agents in the DOD. The chapter reveals that LR at grassroots level is practiced in the way that has resulted to conflicts and costly litigations. In this chapter the regulatory framework and procedures that impede LR practitioners from becoming change agents are also analysed. Chapter 4 covers the data collection process and the analysis thereof. The data reveals that the LR structure at grassroots level is not conducive for the professional delivery of enhanced LR services; that the target group does not have access to adequate resources that would enable them to execute their functions; and that empowerment programmes are implemented to equip the target group with adequate qualifications, skills and or knowledge to be able to render enhanced LR services. The main findings were that guidance is lacking to ensure that LR systems, structures and processes at grassroots level are in place, to ensure that LR matters are managed and handled in a fair and responsible way; to ensure that LR staff with adequate competences to render LR services is appointed; and to ensure that the LR department is active enough and lead the execution of enhanced LR services. In Chapter 5 the main findings are analysed and it is concluded that LR practitioners are unable to become change agents if LR systems, structures and processes are not in place. It is encouraged that LR practitioners should form a cohesive but diverse team that is able to render enhanced LR services, and that the LR department should take a leading role. It is recommended that a study be conducted to determine overarching LR strategy that would guide the establishment of LR systems, the determination of LR structure and processes for dealing with LR matters, and the empowerment programmes for ensuring the professional delivery of enhanced LR services.
AFRIKAANSE OPSOMMING: Hoofstuk 1 skets die doel van die navorsing en verskaf agtergrond oor die manier waarop arbeidsverhoudinge tans in die Departement van Verdediging bestuur en hanteer word. In hierdie hoofstuk word die navorsingsprobleem ook geïdentifiseer en die navorsingsontwerp en -metodologie uitgestippel. Hoofstuk 2 ondersoek die teoretiese raamwerk van arbeidsverhoudingbeginsels en die bestuur van verandering. Die hoofstuk openbaar dat die beginsels van arbeidsverhoudinge persone in bestuurs- of toesighoudende posisies verantwoordelik hou vir die bestuur van arbeidsverhoudingkwessies. Daar word voorgestel dat arbeidsverhoudingpraktisyns daarom in staat moet wees om hierdie persone toe te rus met voldoende vaardighede en kennis van die prosedures vir die hantering van arbeidsverhoudingkwessies in die werkplek. Die hoofstuk openbaar ook dat die beginsels van die bestuur van verandering aandui dat werknemers op verandering voorbereid moet wees en dat ’n veranderingsagent geïdentifiseer moet word. Só ’n agent moet ’n atmosfeer skep wat bevorderlik vir verandering is deur steun vir die voorgestelde verandering van persone in bestuur en werknemers te werf. Verder moet weerstand teen verandering in ’n vroeë stadium in die veranderingsproses vasgestel word om dit sodoende uit te skakel. Veranderingsagente word aangemoedig om nie die veranderingsproses te oorheers nie, maar eerder te vergemaklik om te verseker dat die instelling en sy werknemers die veranderingsproses self dryf. Hoofstuk 3 ondersoek die teikens van die arbeidsverhoudingsteunfunksie asook die inhoud van arbeidsverhoudingpraktyke om te bepaal tot watter mate arbeidsverhoudingpraktisyns veranderingsagente in die Departement van Verdediging kan word. Hierdie hoofstuk onthul dat arbeidsverhoudinge op grondvlak op ’n manier beoefen word wat reeds tot konflik en duur litigasies gelei het. In hierdie hoofstuk word die regulerende raamwerk en prosedures geanaliseer wat arbeidsverhoudingpraktisyns verhinder om veranderingsagente te word. Hoofstuk 4 dek die data-insamelingsproses en analise van hierdie proses. Die data onthul dat die arbeidsverhoudingstruktuur op grondvlak nie bevorderlik is vir die professionele lewering van verbeterde arbeidsverhoudingdienste nie, en dat die teikengroep nie toegang tot voldoende bronne het wat hulle in staat sou stel om hulle funksies uit te voer nie. Die data openbaar verder dat bemagtigingsprogramme toegepas word om die teikengroep met voldoende opleiding, vaardighede en/of kennis toe te rus om verbeterde arbeidsverhoudingdienste te lewer. Die hoofbevinding was dat daar gebrekkige leiding is om te verseker dat arbeidsverhoudingstelsels, -strukture en -prosesse op grondvlak gereed is; dat arbeidsverhoudingkwessies op ’n regverdige en verantwoordelike manier bestuur en hanteer word; dat arbeidsverhoudingpersoneel met voldoende bevoegdhede aangestel word om arbeidsverhoudingdienste te lewer, en dat die arbeidsverhoudingdepartement aktief genoeg is en die voortou neem in die uitvoering van verbeterde arbeidsverhoudingdienste. In hoofstuk 5 word die hoofbevindinge geanaliseer en die gevolgtrekking gemaak dat arbeidsverhoudingpraktisyns nie in staat is om veranderingsagente te word indien arbeidsverhoudingstelsels, -strukture en -prosesse nie gereed is nie. Arbeidsverhoudingpraktisyns word aangemoedig om ’n verenigde maar diverse span te vorm wat verbeterde arbeidsverhoudingdienste kan bied en die arbeidsverhoudingdepartement word aangemoedig om ’n leidende rol in hierdie verband te speel. Daar word aanbeveel dat ’n studie gedoen word om ’n oorkoepelende arbeidsverhoudingstrategie vas te stel wat as riglyn kan dien vir die stigting van arbeidsverhoudingstelsels, die bepaling van arbeidsverhoudingstruktuur en prosesse om met arbeidsverhoudingkwessies om te gaan, en bemagtigingsprogramme om te verseker dat verbeterde arbeidsverhoudingdienste professioneel gelewer word.
Hendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.
Full textThe need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual nodes. To this end, we build and solve a defender-attacker-defender (DAD) optimization model that provides the optimal location of repeater nodes that maintains as much of the function of the network as possible, even after a worst-case attack. We analyze four initial basic network configurations and compare the resulting optimum node placements when the network is not subject to attack, when the network is subject to two attacks, and when the flow of each network configuration is completely blocked by attacks.
Yun, Ronald E. "Network defense-in-dept : evaluating host-based intrusion detection systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA395808.
Full textBarnes, David S. "A defense-in-depth approach to phishing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBarnes.pdf.
Full textThesis Advisor(s): Craig H. Martell, Neil C. Rowe. "September 2006." Includes bibliographical references (p. 71). Also available in print.
Anderson, John C. Scott Clifford G. "Benchmarking and performance metrics for a defense distribution depot /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359952.
Full text"December 1998." Thesis advisor(s): Kevin R. Gue, Jane Feitler. Includes bibliographical references (p. 69-70). Also available online.
Anderson, John C., and Clifford G. Scott. "Benchmarking and performance metrics for a defense distribution depot." Thesis, Monterey, California. Naval Postgraduate School, 1998. http://hdl.handle.net/10945/32605.
Full textPennock, Michael James. "The economics of enterprise transformation." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28171.
Full textCommittee Chair: Rouse, William; Committee Member: Boff, Kenneth; Committee Member: Cross, Stephen; Committee Member: Griffin, Paul; Committee Member: Keskinocak, Pinar.
Rush, Marvin P., and Eric H. Burks. "Implementing a fast-pick area at Defense Distribution Center San Joaquin (DDJC)." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1139.
Full textIn a warehouse, a fast-pick-area is a region containing many items that can be retrieved quickly and inexpensively to fulfill customer orders. The Defense Distribution Center San Joaquin (DDJC) implements a similar strategy on a wider scale by designating one of many warehouses as a "fast-pick-area." We develop a plan to optimally slot the fast-pick area at DDJC using a computer model that captures the tradeo.s of storage space versus cost of replenishment from bulk storage. Our results suggest that defense distribution centers should consider implementing a fast pick area as a means of reducing operating costs.
Lieutenant Commander, United States Navy
Books on the topic "Dept of Defence"
Ireland. Office of the Comptroller and Auditor General. Department of Defence: Defence property. Dublin: Stationery Office, 1998.
Find full textMark, Thomson. Your defence dollar: The 2004-2005 defence budget. Barton, A.C.T: Australian Strategic Policy Institute, 2004.
Find full textMark, Thomson. Your defence dollar: The 2004-2005 defence budget. Barton, A.C.T: Australian Strategic Policy Institute, 2004.
Find full textCanada. Commission of Inquiry into the Deployment of Canadian Forces to Somalia. National Defence Headquarters: Centre of decision. Ottawa: The Commission, 1997.
Find full textDempsey, David B. US Defence contracts. London: Longman, 1987.
Find full textThe Department of Defence. South Melbourne: Oxford University Press, 2001.
Find full textHalstead, John. A defence policy for Canada: The white paper two years on. [Toronto]: Canadian Institute of International Affairs, 1989.
Find full textWomen, Voice of. The white paper: Challenge and commitment, a defence policy for Canada. Toronto: National Action Committee on the Status of Women, 1987.
Find full textHalstead, John. A defence policy for Canada: The white paper two years on. [Toronto]: Canadian Institute of International Affairs, 1989.
Find full text(Australia), Defence Efficiency Review. Future directions for the management of Australia's defence. Canberra, A.C.T: Directorate of Pub. and Visual Communications, Defence-Centre Canberra, 1997.
Find full textBook chapters on the topic "Dept of Defence"
Holmberg, Jan-Erik. "Defense-in-Depth." In Handbook of Safety Principles, 42–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119443070.ch4.
Full textBettany, Andrew, and Mike Halsey. "Malware Defense in Depth." In Windows Virus and Malware Troubleshooting, 21–39. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2607-0_3.
Full textRass, Stefan, Stefan Schauer, Sandra König, and Quanyan Zhu. "Defense-in-Depth-Games." In Advanced Sciences and Technologies for Security Applications, 211–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5_10.
Full textSlugeň, Vladimír. "Defence in Depth of VVER-440 Reactors." In Safety of VVER-440 Reactors, 5–15. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-84996-420-3_3.
Full textTullberg, Rita McWilliams, and Victor L. Urquidi. "Military-related Debt in Non-oil Developing Countries, 1972–82." In Peace, Defence and Economic Analysis, 302–18. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18898-7_14.
Full textWilliams, Joel, Job King, Byron Smith, Seyedamin Pouriyeh, Hossain Shahriar, and Lei Li. "Phishing Prevention Using Defense in Depth." In Advances in Security, Networks, and Internet of Things, 101–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71017-0_8.
Full textSzymanek, Andrzej. "“Defence-in-Depth” Strategy in Transport Risk Management." In Communications in Computer and Information Science, 51–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16472-9_5.
Full textBoggs, Nathaniel, Senyao Du, and Salvatore J. Stolfo. "Measuring Drive-by Download Defense in Depth." In Research in Attacks, Intrusions and Defenses, 172–91. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_9.
Full textPantopoulou, Styliani, Pola Lydia Lagari, Clive H. Townsend, and Lefteri H. Tsoukalas. "Data-Based Defense-in-Depth of Critical Systems." In Lecture Notes in Computer Science, 283–90. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61725-7_33.
Full textKonorski, Jerzy, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, and Pawel Szalachowski. "A Virtualization-Level Future Internet Defense-in-Depth Architecture." In Communications in Computer and Information Science, 283–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_29.
Full textConference papers on the topic "Dept of Defence"
Cointet, A. "Defence in depth: transport system and defence system." In URBAN TRANSPORT 2008. Southampton, UK: WIT Press, 2008. http://dx.doi.org/10.2495/ut080091.
Full textHitchins, D. K. "Secure systems - defence in depth." In European Convention on Security and Detection. IEE, 1995. http://dx.doi.org/10.1049/cp:19950464.
Full textGhaednia, Hossein, Sreekanta Das, Rick Wang, and Richard Kania. "Effect of Dent Depth on the Burst Pressure of NPS30 X70 Pipes With Dent-Crack Defect." In 2014 10th International Pipeline Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/ipc2014-33071.
Full textLe Bastard, Avigae¨le. "Influence of Internal Pressure for Depth Measurement on a Dent." In 2006 International Pipeline Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/ipc2006-10103.
Full textNovak, Boris, Jane MacMaster, and Mike Kalms. "The RPDE organisation - a digital ecosystem in the Australian Defence sector." In 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference. IEEE, 2007. http://dx.doi.org/10.1109/dest.2007.371938.
Full textGroat, Stephen, Joseph Tront, and Randy Marchany. "Advancing the defense in depth model." In 2012 7th International Conference on System of Systems Engineering (SoSE). IEEE, 2012. http://dx.doi.org/10.1109/sysose.2012.6384127.
Full textBreuer, Timo, Christoph Bodensteiner, and Michael Arens. "Low-cost commodity depth sensor comparison and accuracy analysis." In SPIE Security + Defence, edited by Gary Kamerman, Ove Steinvall, Gary J. Bishop, Ainsley Killey, and John D. Gonglewski. SPIE, 2014. http://dx.doi.org/10.1117/12.2067155.
Full textGhaednia, Hossein, Sreekanta Das, Jamshid Zohrehheydariha, Rick Wang, and Richard Kania. "Effect of Crack Depth on Burst Strength of X70 Linepipe With Dent-Crack Defect." In 2016 11th International Pipeline Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/ipc2016-64098.
Full textFielder, Andrew, Tingting Li, and Chris Hankin. "Defense-in-depth vs. Critical Component Defense for Industrial Control Systems." In 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development, 2016. http://dx.doi.org/10.14236/ewic/ics2016.1.
Full textSlipper, Dan, Alistair A. McEwan, and Wilson Ifill. "Modelling and analysing Defence-in-Depth in arming systems." In 2013 IEEE International Conference on System Science and Engineering (ICSSE). IEEE, 2013. http://dx.doi.org/10.1109/icsse.2013.6614680.
Full textReports on the topic "Dept of Defence"
DEFENSE DEPOT TRACY CA. Defense Depot Tracy Total Quality Management Plan. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada212963.
Full textDEFENSE DEPOT OGDEN UT. Total Quality Management Implementation Plan: Defense Depot, Ogden. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada212936.
Full textDEFENSE DEPOT MEMPHIS TN. Total Quality Management Implementation Plan Defense Depot Memphis. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada212961.
Full textDEFENSE DEPOT MECHANICSBURG PA. Defense Depot Mechanicsburg Total Quality Management Implementation Plan. Fort Belvoir, VA: Defense Technical Information Center, June 1989. http://dx.doi.org/10.21236/ada212964.
Full textEdward G. Wallace, Karl N. Fleming, and Edward M. Burns. Next Generation Nuclear Plant Defense-in-Depth Approach. Office of Scientific and Technical Information (OSTI), December 2009. http://dx.doi.org/10.2172/971362.
Full textNicol, David M. A Tool for Compliance and Depth of Defense Metrics. Fort Belvoir, VA: Defense Technical Information Center, June 2014. http://dx.doi.org/10.21236/ada604169.
Full textDEPARTMENT OF DEFENSE WASHINGTON DC. Defense Depot Maintenance Council Cost Comparability Committee, Cost Comparability Handbook. Fort Belvoir, VA: Defense Technical Information Center, August 1993. http://dx.doi.org/10.21236/ada278901.
Full textKostanski, Henry J., and Dennis Hopkinson. Simulation of DDMT's (Defense Depot Memphis Tennessee) Central Pack Area. Fort Belvoir, VA: Defense Technical Information Center, March 1989. http://dx.doi.org/10.21236/ada212691.
Full textFarber, Adam M., and Robert A. Rawls. Defense in Depth Added to Malicious Activities Simulation Tools (MAST). Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ad1008924.
Full textHayes, T. G., and J. L. Kelly. Defense-in-depth evaluation for the New Waste Transfer Facility. Office of Scientific and Technical Information (OSTI), January 1995. http://dx.doi.org/10.2172/105700.
Full text