Home
DAG Tutorial
Search
Available Downloads
Feedback
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
Jump to Content
Jump to Navigation and Tools
Help
.
ACC Practice Center
>
AT&L Knowledge Management...
>
Welcome to the Defense...
>
Chapter 2 -- Program...
>
2.1. Program...
View History
2.1. Program Strategies—General
Topic
JavaScript is currently disabled. Some advanced features may not be supported.
Loading section 2.1. Program Strategies—General please wait.
List of All Contributions at This Location
Rss Link
Show All
|
Filtered By
No items found.
Popular Tags
Browse
ACC Home
Up one level
Welcome to the Defense Acquisition...
Foreword
Chapter 1 -- Department of Defense...
1.0. Overview
1.1. Integration of the DoD Decision...
1.2. Planning Programming Budgeting and...
1.3. Joint Capabilities Integration and...
1.4. Defense Acquisition System
Chapter 2 -- Program Strategies
2.0 Overview
2.1. Program Strategies—General
2.2. Program Strategy Document...
2.3. Program Strategy Relationship to...
2.4. Relationship to Request for...
2.5. Program Strategy Classification...
2.6. Program Strategy Document Approval...
2.7. Acquisition Strategy versus...
2.8. Technology Development...
Chapter 3 -- Affordability and...
3.0. Overview
3.1. Life-Cycle Costs/Total Ownership...
3.2. Affordability
3.3. Analysis of Alternatives
3.4. Cost Estimation for Major Defense...
3.5. Manpower Estimates
3.6. Major Automated Information Systems...
3.7. Principles for Life-Cycle Cost...
Chapter 4 -- Systems Engineering
4.0. Overview
4.1. Introduction
4.2. Systems Engineering Activities in...
4.3. Systems Engineering Processes
Chapter 5 -- Life-Cycle Logistics
5.0. Overview
5.1. Life-Cycle Sustainment in the...
5.2. Applying Systems Engineering to...
5.3. Supportability Design...
5.4. Sustainment in the Life-Cycle...
5.5. References
Chapter 6 -- Human Systems Integration...
6.0. Overview
6.1. Total System Approach
6.2 HSI - Integration Focus
6.3. Human Systems Integration Domains
6.4. Human Systems Integration (HSI)...
6.5. Manpower Estimates
6.6. Additional References
Chapter 7 -- Acquiring Information...
7.0. Overview
7.1. Introduction
7.2. DoD Information Enterprise
7.3. Interoperability and Supportability...
7.4. Sharing Data, Information, and...
7.5. Information Assurance (IA)
7.6. Electromagnetic Spectrum
7.7. Accessibility of Electronic and...
7.8. The Clinger-Cohen Act (CCA) --...
7.8.4. Title 40/Clinger-Cohen Act (CCA)...
7.8.5. Other Title 40/Clinger-Cohen Act...
7.8.6. Title 40 Subtitle...
7.8.7. Procedure for Risk-Based...
7.9. Post-Implementation Review (PIR)
7.10. Commercial Off-the-Shelf (COTS)...
7.10.6. Best Practices Tools and Methods
7.11. Space Mission Architectures
Chapter 8 -- Intelligence Analysis...
8.0. Introduction
8.1. Threat Intelligence Support
8.2. Signature and other Intelligence...
8.3. Support to the Intelligence...
Chapter 9 -- Test and Evaluation (T&E)
9.0 Overview
9.1 OSD T&E Organization
9.2 Service-Level T&E Management
9.3 Test and Evaluation
9.4 Integrated Test and Evaluation
9.5 Test and Evaluation Planning
9.6 T&E Reporting
9.7 Special Topics
9.7.5 Testing in a Joint Operational...
9.7.6 Information Assurance Testing
9.8. Best Practices
9.9. Prioritizing Use of Government Test...
Chapter 10 -- Decisions Assessments and...
Chapter 11 -- Program Management...
11.0. Overview
11.1. Joint Programs
11.2. International Programs
11.3. Integrated Program Management
11.4. Knowledge-Based Acquisition
11.5. Technical Representatives at...
11.6. Contractor Councils
11.7 Property
11.8. Modeling and Simulation (M&S)...
Chapter 12 - Defense Business System...
12.0 Overview
12.0.2 BCL Introduction
12.1 Business Capability Definition...
12.2 Investment Management (IM) Phase
12.3 Execution
12.3.2 Prototyping Phase
12.3.3 Engineering Development
12.3.4 Limited Fielding
12.3.5 Full Deployment
12.3.6 Operations & Support (O&S)
12.4 DBS-specific Criteria
12.5 Tools and Methods
Chapter 13 -- Program Protection
13.0 Overview
13.1 The Program Protection Process
13.2 The Program Protection Plan (PPP)
13.3 Critical Program Information (CPI)...
13.4. Intelligence and...
13.5. Vulnerability Assessment
13.6. Risk Assessment
13.7. Countermeasures
13.8. Horizontal Protection
13.9. Foreign Involvement
13.10. Managing and Implementing PPPs
13.11. Compromises
13.12. Costs
13.13. Contracting
13.14. Detailed System Security...
13.15. Program Protection Plan (PPP)...
13.16. Program Protection Plan (PPP)...
Chapter 14 -- Acquisition of Services
DoD Directive 5000.01
ENCLOSURE 1 ADDITIONAL POLICY
DoD Instruction 5000.02
Recent Policy and Guidance
Download the Defense Acquisition...
Weapon Systems Acquisition Reform Act of...
ATTACHMENT 1 DoD ACQUISITION POLICY...
ATTACHMENT 2 MS A CERTIFICATION...
ATTACHMENT 3 MS B CERTIFICATION...
ATTACHMENT 4 CRITICAL COST GROWTH...
Current JCIDS Manual and CJCSI 3170.01 I
Defense Acquisition Guidebook Key...
Tags
09-027
acat
"acat i"
"acat ia"
"acat ii"
"acat iii"
acquisition
"alternate lft&e plan"
aoa
apb
"beyond-lrip report"
card
cca
cdd
"certification of spectrum support"
contracting
cpd
dbsmc
"dd form 1494"
"defense acquisition management system"
"dtm 10-017"
"engineering and manufacturing development phase"
"evolutionary acquisition"
hsi
icd
iot&e
isp
iuid
lcce
lft&e
lrip
mais
mda
mdap
"milestone requirements"
"operations and support phase"
peshe
"production and deployment phase"
"review procedures"
se
sep
service
sustainment
"systems engineering"
tds
"technology development"
"technology development phase"
"technology opportunities"
tra
"user needs"
View All
ACC Practice Center Version
3.2
Application Build 3.2.9
Database Version 3.2.9