WorldCat Identities

Alexander, Keith B.

Overview
Works: 8 works in 12 publications in 1 language and 20 library holdings
Roles: Author
Publication Timeline
.
Most widely held works by Keith B Alexander
Design and analysis of a generalized class of fin-line filters by Keith B Alexander( )

1 edition published in 2012 in Undetermined and held by 9 WorldCat member libraries worldwide

Distinguished Alumni Award Program author. GEN Keith Alexander, USA (Presented 24 September 2010). NPS Hall of Fame author (Presented June 21, 2013)
Design and Analysis of a Generalized Class of Fin-Line Filters by Keith B Alexander( Book )

3 editions published in 1983 in English and held by 3 WorldCat member libraries worldwide

This study investigates fin-line filter structures, a type of E-plane waveguide device. Expressions germane to the analysis of fin-line structures are developed. A computer aided design and analysis program based upon a mode-matching technique is described. Filters designed by this program are fabricated and tested in X-band. Good agreement with predicted response is obtained. Filters fabricated and tested in Ku and Ka bands by other researchers are analyzed by the new program. Good agreement between predicted response and published performance is noted. (Author)
Secure From the Start: Designing and Implementing an Assured National Security Enterprise( Book )

2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide

The Global Information Grid (GIG) information assurance (IA) architecture is the embodiment of an Enterprise IA model and is being designed to support the entire National Security Enterprise with input from the Department of Defense, Department of Homeland Security, and intelligence community. It is an essential enabler of the GIG Net-Centric Warfare vision. National Security Agency (NSA) architects have identified innovative IA approaches to support dynamic, secure enterprise-wide information sharing. Portfolio management for the effort is being provided by the GIG IA Portfolio Management Office at NSA in partnership with Office of the Secretary of Defense, and the Military Services, commands and agencies
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7( Book )

2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide

Crosstalk's mission is to encourage the engineering development of software to improve the reliability, sustainability, and responsiveness of our warfighting capability. Articles in this journal issue include: DoD CIO: the Net-centric Information Enterprise; Information Sharing is a Strategic Imperative; Designing and Implementing an Assured National Security Enterprise; Serve-Oriented Architecture in Net-Centric Operations, Creating the Enabling Capability to Conduct Net-Centric Operations, Overview of the Dept. of Defense Net-Centric Data Strategy, Transformational Communications: Systems for DoD Net-Centric Operations; Development of a Ground Vehicle Maneuver Oncology to Support the Common Operational Picture
Warfighting in Cyberspace( )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Our current and potential adversaries clearly understand the military potential of cyberspace and the expansive power of the medium. Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. They can operate essentially unrestrained and are free to innovate, unbound by law, policy, or precedent. Nations such as China and Russia are developing their own?cyberspace warriors.? China, for instance, has formed cyberspace battalions and regiments, the primary purpose of which is to identify and exploit weaknesses in our military, government, and commercial networks. In November 1999, the PLA Daily stated, "Internet warfare is of equal significance to land, sea, and air power and requires its own military branch," and that "it is essential to have an all-conquering offensive technology and to develop software and technology for net offensives ... able to launch attacks and countermeasures." The threat from these forces is credible and real. While the time-tested principles of war will ultimately apply in cyberspace, its characteristics are so radically different that they demand significant innovation and changes to the way we organize and conduct military operations and tactics in this domain. Many within the U.S. Government and private sector are beginning to recognize the importance of cyberspace (and operations within it) to national security. The March 2005 National Defense Strategy identified cyberspace as a new theater of operations and assessed cyberspace operations as a potentially disruptive challenge, concluding that in "rare instances, revolutionary technology and associated military innovation can fundamentally alter long-established concepts of warfare."
Warfighting in cyberspece by Keith B Alexander( )

1 edition published in 2011 in English and held by 1 WorldCat member library worldwide

 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.61 (from 0.34 for Design and ... to 0.99 for Warfightin ...)

Alternative Names
Keith B. Alexander Amerikaans spion

Keith B. Alexander US-amerikanischer General, Direktor des Nachrichtendienstes NSA

Keith Brian Alexander

Кит Александер американский военный деятель

برايان الكسندر

کتھ اسکندر

کیث بی آلکساندر

キース・B・アレクサンダー

基思·B·亚历山大

基斯·亞歷山大

Languages
English (11)