Showing 1 - 5 results of 5 for search 'McKernan, Megan', query time: 0.01s
Refine Results
-
1
Prolonged cycle times and schedule growth in defense acquisition : a literature review / by Riposo, Jessie, McKernan, Megan, Duran, Chelsea Kaihoi
Published 2014Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
2
Rapid acquisition and fielding for information assurance and cyber security in the Navy / by Porche, Isaac, 1968-, McKay, Shawn, McKernan, Megan, Button, Robert, Giglio, Kate
Published 2012Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
3
DoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches / by Arena, Mark V., Blickstein, Irv, 1939-, Gonzales, Daniel, 1956-, Harting, Sarah J., Lewis, Jennifer, McGee, Michael, McKernan, Megan P., Nemfakos, Charles Panagiotis, Osburg, Jan, Rudavsky, Rena, Sollinger, Jerry M.
Published 2014Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
4
Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches. program manager tenure, oversight of acquisition category II programs, and framing assumptions / by Arena, Mark V., Blickstein, Irv, 1939-, Doll, Abby, Drezner, Jeffrey A., Kavanagh, Jennifer, 1981-, McCaffrey, Daniel F., McKernan, Megan, Nemfakos, Charles Panagiotis, Sollinger, Jerry M., Tremblay, Daniel, Wong, Carolyn, 1952-
Published 2013Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
5
Management perspectives pertaining to Root Cause Analyses of Nunn-McCurdy Breaches. contractor motivations and anticipating breaches / by Arena, Mark V., Birkler, J. L., 1944-, Blickstein, Irv, 1939-, Nemfakos, Charles Panagiotis, Doll, Abby, Drezner, Jeffrey A., Lee, Gordon T., McKernan, Megan P., McInnis, Brian, Price, Carter C., Sollinger, Jerry M., York, Erin
Published 2014Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook
Search Tools:
Related Subjects
Procurement
Defense contracts
Armed Forces
Computer security
Computer software
Computers
Cost control
Cost effectiveness
Costs
Cyberterrorism
Equipment
Government contractors
Government purchasing
Information technology
Law and legislation
Motivation (Psychology)
Planning
Prevention
Purchasing
Weapons systems