Resource Library

Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Marsha Carpenter by phone (703) 631-6181 or Email or your SIGNAL account executive.

Defensive Cyber Operation Symposium
Author: AFCEA Event Video Pesentations   Send Email to POC   View Content
Conference Dates: June 16-18, 2015 *Leaders in the cyber domain outline goals and offer predictions. *DISA Director Lt. Gen. Ronnie Hawkins Jr., USAF, releases and discusses the agencys updated strategic plan for 2015-2020. * Terry Halvorsen, CIO, U.S. Defense Department, suggests the department needs to get a little smarter regarding the policy for storing passwords. *DISA panelists woo industry, stressing the need for cooperation. Click here to see and listen to more information shared at the conference.

Network Interoperability
Author: AFCEA   Send Email to POC   View Content
Network interoperability has been a long-sought goal ever since the appearance of the second military network. The issue has grown, of course, concurrent with the development of varied networks serving multiple and single customers. Now, militaries are embracing network of networks architectures as they seek an enterprise network solution.

Communications Amplifiers, just how much farther can I go if I use one?
Author: AR Worldwide   Send Email to POC   View Content
Next to "how much does one of those cost" this is the number one question from Radio system operators. Unfortunately having a 10 times increase in RF power output doesn't give you 10 times the range compared to the basic transceiver. Terrain, obstructions, Antenna gain and Antenna location all play a part in this simple question to which there isn't a simple answer. Read this paper and get better informed about this important and interesting subject!

Web Security and the OWASP Top 10: The Big Picture
Author: Plural Sight   Send Email to POC   View Content
Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritization of risks and most importantly, how organizations building software for the web can protect against them.

Easing the Burden of Records Management: Automating Records Capture
Author: Kofax, Inc.   Send Email to POC   View Content
Deadlines are looming for all U.S. Federal Agencies to implement and demonstrate their compliance with the 2012 Directive (M-12-18) from OMB/NARA, mandating electronic record keeping by 2019. Capture and categorization in relation to electronic records management is the greatest burden for the user community. Download this AIIM white paper to learn strategies to comply with these mandates while maximizing operational efficiency.

The Security Implications of the Internet of Things
Author: AFCEA   Send Email to POC   View Content
The Internet of Things (IoT) comprises creative products that connect healthcare, home energy consumption, mass transit, insurance, and almost every economic sector. With these new devices, we have infinitely more opportunities, yet little consideration is being paid to the cyber security of this phenomenon. Once consumers introduce the IoT into their lives, machine-to-machine interactions begin on their behalf. Assumptions about privacy and protections need to be considered now, before the massive rollout. The implications of the IoT are significant, and nothing short ...

Using Wider, Deeper Views of Elusive Signals to Characterize Complex Systems and Environments
Author: Keysight   Send Email to POC   View Content
For decades, spectrum analyzers were used in the development and characterization of radar and electronic warfare (EW) systems. However, traditional swept measurements have become insufficient, as most modern radar systems are adaptive, requiring significantly more speed, flexibility, and performance. Today's best alternative is a signal analyzer equipped with real-time spectrum analysis (RTSA) coupled with vector signal analysis (VSA) software. Learn techniques for monitoring EW scenarios, identifying unwanted spectral events, or issues in transmitted signals.

Author: AFCEA, Sponsored by FireEye and Owl Computing Technologies, Inc.   Send Email to POC   View Content
Cybersecurity is becoming the defining element of information system success. Where capabilities and services once ruled, safety now is looming as the most important aspect of a network or information storage system. Since its origins as an afterthought, cybersecurity has moved up the ladder to hold veto power over the use of a new capability.

Big Data
Author: AFCEA   Send Email to POC   View Content
Big data is on every network managers lips as systems and operations are re-shaped to take advantage of this information wellspring. This EBook contains valuable insight on some of the big data initiatives underway and the technology involved as covered by SIGNAL Media.