30 likes | 45 Views
Explore strategies to bolster cyber defense in military activities, focusing on emerging threats and countermeasures. Learn about technology advancements and training initiatives to safeguard sensitive information and systems.
E N D
Controlled Vocabulary at DTIC John Dickert Lexicographer 16 September, 2004
DTIC Tools • DTIC Thesaurus http://stinet.dtic.mil/cgi-bin/thes-add1.pl • Subject Categories http://www.dtic.mil/dtic/subcatguide • Source Codes http://www.dtic.mil/corpsource
Management Data Bases • Basic Research Area Taxonomy http://www.wslfweb.org/docs/dstp2000/Brppdf/sec3.pdf • Defense Technology Areas http://www.fas.org/man/dod-101/army/docs/astmp/c4/t4a1.htm • Joint Warfighting Capability Objectives http://www.fas.org/spp/military/docops/defense/97_jwstp/jwstp.htm