This guidebook is specifically directed at Computer Systems and Software (CS&S) associated with weapon systems. Lack of software management guidance has been identified as a major concern for Air Force organizations involved in the acquisition and sustainment of software-intensive weapon systems. A recent GAO report presented the argument that Department of Defense (DOD) weapons systems under development are riddled with vulnerabilities that make them an easy target for adversaries trying to control them or disrupt their ...
Read More
This guidebook is specifically directed at Computer Systems and Software (CS&S) associated with weapon systems. Lack of software management guidance has been identified as a major concern for Air Force organizations involved in the acquisition and sustainment of software-intensive weapon systems. A recent GAO report presented the argument that Department of Defense (DOD) weapons systems under development are riddled with vulnerabilities that make them an easy target for adversaries trying to control them or disrupt their functions.This guidebook addresses these known issues and sets top level Air Force expectations for the development, acquisition, management and sustainment of weapon systems software and software embedded in Air Force systems, so that software-related problems that are now too typical can be understood and avoided in the future. The principles and techniques in this guidebook will generally apply to all software domains, but the targeted domains include aeronautical, electronics, weapons, and space systems. The intended audience includes Project Officers, systems/software engineers, and other engineers that have a software acquisition element in their project. Why buy a book you can download for free? We print this book so you don't have to. First you gotta find a good clean (legible) copy and make sure it's the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it's all there - including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it's just a 10-page document, no problem, but if it's 500-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at leastan hour. It's much more cost-effective to just order the latest version from ... material is published by 4th Watch Publishing Co. We publish tightly-bound, full-size books at 8 1/2 by 11 inches, with large text and glossy covers. 4th Watch Publishing Co. is a Service Disabled Veteran Owned Small Business (SDVOSB). Please visit ...
Read Less