<--- Back to Details
First PageDocument Content
United States Strategic Command / Defense Technical Information Center / Defense Logistics Agency / United States Southern Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Military / Military-industrial complex
Date: 2013-10-24 16:56:12
United States Strategic Command
Defense Technical Information Center
Defense Logistics Agency
United States Southern Command
U.S. Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
United States Department of Defense
Military
Military-industrial complex

Part 1: Management Discussion and Analysis DoD Performance and Accountability Report

Add to Reading List

Source URL: comptroller.defense.gov

Download Document from Source Website

File Size: 744,65 KB

Share Document on Facebook

Similar Documents

FACT SHEET: National Security Space Strategy DoD Initiatives The National Security Space Strategy (NSSS) is jointly signed by the Secretary of Defense and the Director of National Intelligence. It builds on the President

FACT SHEET: National Security Space Strategy DoD Initiatives The National Security Space Strategy (NSSS) is jointly signed by the Secretary of Defense and the Director of National Intelligence. It builds on the President

DocID: 1gwfm - View Document

National Defense Strategy

National Defense Strategy

DocID: 1ghHp - View Document

Policy Brief  No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

Policy Brief No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

DocID: 1fXrY - View Document

GAO, INSIDER THREATS: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

GAO, INSIDER THREATS: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

DocID: 1fMlp - View Document

How TMT organizations perceive their security  88% 68%

How TMT organizations perceive their security 88% 68%

DocID: 1aLoY - View Document