Northrop Grumman Corporation
Overview
Works: | 343 works in 361 publications in 1 language and 2,977 library holdings |
---|---|
Genres: | Conference papers and proceedings Periodicals History Portraits Technical reports |
Classifications: | TA418.9.C6, 623.7463 |
Publication Timeline
.
Most widely held works about
Northrop Grumman Corporation
- Contacts between Northrop Grumman Corporation and the White House regarding missing White House e-mails : hearing before the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 26, 2000 by United States( Book )
- Business Process Management: Northrop Grumman Space Technology( )
- The Boeing Company by United States( )
- Director of engineering, Northrop Grumman Corp.( Visual )
- Northrop Flying Wings by Graham M Simons( )
- The HR side of Northrop Grumman's acquisition process by Eileen Hogan( )
- Navy shipbuilding : background and issues by Ronald O'Rourke( Book )
- Defense, aerospace, and cyberspace( Visual )
- Cyanide-based electroplating elimination : Northrop Grumman Corporation, Electronics Systems Division - Precision Products Plant( )
- Northrop Grumman Corporation( )
- Ships by Huell Howser( Visual )
- Business Process Management: Northrop Grumman Space Technology( )
- Prints by Bonhams (Firm : 2001)( Book )
- Enhancing the effectiveness of the self-inspection system at Northrop Grumman Corporation by Edmund Fajardo( )
- USS Monitor, Turret Arrival VASCIC, C02-207-159 by Northrop Grumman Corporation( Visual )
- USS Monitor, Turret Arrival VASCIC, C02-207-126 by Northrop Grumman Corporation( Visual )
- Interview with Tony Spear by Anthony J Spear( )
- Thomas V. Jones papers by Thomas V Jones( )
- USS Monitor, Turret Arrival VASCIC, C02-207-61 by Northrop Grumman Corporation( Visual )
- USS Monitor, Turret Arrival VASCIC, C02-207-167 by Northrop Grumman Corporation( Visual )
more

fewer

Most widely held works by
Northrop Grumman Corporation
MEMSYS 2017 : proceedings of the International Symposium on Memory Systems : Washington DC, October 2-5, 2017 by International Symposium on Memory Systems(
)
1 edition published in 2017 in English and held by 237 WorldCat member libraries worldwide
1 edition published in 2017 in English and held by 237 WorldCat member libraries worldwide
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage by
Bryan A Krekel(
)
2 editions published in 2012 in English and held by 235 WorldCat member libraries worldwide
Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms
2 editions published in 2012 in English and held by 235 WorldCat member libraries worldwide
Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms
Determining a critical-skill hierarchy for Command Post of the Future (CPOF) by Richard Catrambone(
)
1 edition published in 2009 in English and held by 180 WorldCat member libraries worldwide
The Command Post of the Future (CPOF) is a dynamic visualization tool that supports collaborative decision-making in tactical units. The system uses a customizable workspace based on the user's needs rather than a static format. While such an approach to digital-systems design offers flexibility and generality of use, it might also increase the complexity of learning to use the interface. As a precursor to examining alternative training approaches for CPOF, this report documents an analysis of and hierarchical structure for underlying CPOF skills. A knowledge extraction process was conducted with CPOF domain experts (DEs) to uncover the knowledge needed to use CPOF. The DEs performed a series of tasks based on the practical exercises developed for training Soldiers. A Critical Skills Document was iteratively updated and reorganized to identify the major components of the system and the procedures for accomplishing various tasks. The Critical Skills Document represents CPOF skills in a way to show their generality and applicability. Instructional designers can use it to determine what to train as well as a guide for developing learning assessments. The findings provide a foundation for comparing training approaches for CPOF and similar digital systems
1 edition published in 2009 in English and held by 180 WorldCat member libraries worldwide
The Command Post of the Future (CPOF) is a dynamic visualization tool that supports collaborative decision-making in tactical units. The system uses a customizable workspace based on the user's needs rather than a static format. While such an approach to digital-systems design offers flexibility and generality of use, it might also increase the complexity of learning to use the interface. As a precursor to examining alternative training approaches for CPOF, this report documents an analysis of and hierarchical structure for underlying CPOF skills. A knowledge extraction process was conducted with CPOF domain experts (DEs) to uncover the knowledge needed to use CPOF. The DEs performed a series of tasks based on the practical exercises developed for training Soldiers. A Critical Skills Document was iteratively updated and reorganized to identify the major components of the system and the procedures for accomplishing various tasks. The Critical Skills Document represents CPOF skills in a way to show their generality and applicability. Instructional designers can use it to determine what to train as well as a guide for developing learning assessments. The findings provide a foundation for comparing training approaches for CPOF and similar digital systems
Peer-to-peer training facilitator's guide : development and evaluation by Michele N Costanza(
)
1 edition published in 2009 in English and held by 180 WorldCat member libraries worldwide
The peer-to-peer (P2P) training approach involves small groups of people from similar social groupings, who are not professional teachers, helping each other to learn. The P2P approach has great potential for rapidly identifying emerging lessons learned and integrating them into wide-reaching Army training. The present research identified the instructional principles and best practices for P2P from academia, industry, and the military supporting effective P2P training and incorporated them into a Soldier-friendly facilitator?s guide. A formative evaluation was conducted with Soldiers using the guide to prepare and conduct group discussions for a face-to-face group setting and a distributed group setting where Soldiers were linked via video teleconference. One group of Soldiers served as?facilitators? and used the facilitator?s guide to prepare and lead discussions with other Soldiers who served as?learners.? Feedback on the guide was mostly positive with Soldiers indicating that the guide provided an appropriate amount of information and a usable format and tools for structuring and fostering group discussions. Ongoing efforts to transition P2P methods into Army training are discussed
1 edition published in 2009 in English and held by 180 WorldCat member libraries worldwide
The peer-to-peer (P2P) training approach involves small groups of people from similar social groupings, who are not professional teachers, helping each other to learn. The P2P approach has great potential for rapidly identifying emerging lessons learned and integrating them into wide-reaching Army training. The present research identified the instructional principles and best practices for P2P from academia, industry, and the military supporting effective P2P training and incorporated them into a Soldier-friendly facilitator?s guide. A formative evaluation was conducted with Soldiers using the guide to prepare and conduct group discussions for a face-to-face group setting and a distributed group setting where Soldiers were linked via video teleconference. One group of Soldiers served as?facilitators? and used the facilitator?s guide to prepare and lead discussions with other Soldiers who served as?learners.? Feedback on the guide was mostly positive with Soldiers indicating that the guide provided an appropriate amount of information and a usable format and tools for structuring and fostering group discussions. Ongoing efforts to transition P2P methods into Army training are discussed
Integrated medical environments and the virtual reality patient(
Book
)
1 edition published in 1997 in English and held by 87 WorldCat member libraries worldwide
Northrop Grumman an and Ethicon Endo-Surgery, along with Armstrong Laboratory's Aircrew Training Research Division, are developing prototype training systems to assist surgeons in triage assessment and in procedures for battlefield casualty management. The goal is to develop an integrated training system built around three major components: (1) a Biomedical Instructional Systems Decision Support System (BISD DSS) to characterize training tasks and set instructional objectives and performance standards; (2) a simulation based on the PrecepterTM virtual reality patient to support training for battlefield wound diagnosis and laparoscopic surgery; and (3) an intelligent tutoring system hosted on PrecepterTM to teach decision making skills for battlefield wound diagnosis and subsequent laparoscopic procedures
1 edition published in 1997 in English and held by 87 WorldCat member libraries worldwide
Northrop Grumman an and Ethicon Endo-Surgery, along with Armstrong Laboratory's Aircrew Training Research Division, are developing prototype training systems to assist surgeons in triage assessment and in procedures for battlefield casualty management. The goal is to develop an integrated training system built around three major components: (1) a Biomedical Instructional Systems Decision Support System (BISD DSS) to characterize training tasks and set instructional objectives and performance standards; (2) a simulation based on the PrecepterTM virtual reality patient to support training for battlefield wound diagnosis and laparoscopic surgery; and (3) an intelligent tutoring system hosted on PrecepterTM to teach decision making skills for battlefield wound diagnosis and subsequent laparoscopic procedures
Northrop Grumman B-2 Spirit : an illustrated history by
William G Holder(
Book
)
2 editions published in 1998 in English and held by 31 WorldCat member libraries worldwide
Beskriver det avancerede amerikanske bombefly B-2 Spirit, der er konstrueret efter Stealth-princippet og på grund af formen kaldes "Flyvende vinge."
2 editions published in 1998 in English and held by 31 WorldCat member libraries worldwide
Beskriver det avancerede amerikanske bombefly B-2 Spirit, der er konstrueret efter Stealth-princippet og på grund af formen kaldes "Flyvende vinge."
Proceedings of the American Society for Composites Tenth Technical Conference : composite materials, mechanics, and processing
: October 18-20, 1995, Miramar Sheraton Hotel, Santa Monica, California by
American Society for Composites(
Book
)
1 edition published in 1995 in English and held by 26 WorldCat member libraries worldwide
1 edition published in 1995 in English and held by 26 WorldCat member libraries worldwide
Assessment of probabilistic certification methodology for composite structures by H. P Kan(
Book
)
1 edition published in 2001 in English and held by 6 WorldCat member libraries worldwide
A sensitivity study has been conducted to assess the currently available probabilistic structural analysis methods. The influence of the distribution parameters on the probability of failure was investigated analytically. The significant parameters that have an impact on development of probabilistic certification procedures were identified. The technical gaps which need to be filled for probabilistic certification of composite structures were discussed
1 edition published in 2001 in English and held by 6 WorldCat member libraries worldwide
A sensitivity study has been conducted to assess the currently available probabilistic structural analysis methods. The influence of the distribution parameters on the probability of failure was investigated analytically. The significant parameters that have an impact on development of probabilistic certification procedures were identified. The technical gaps which need to be filled for probabilistic certification of composite structures were discussed
Probabilistic design methodology for composite aircraft structures by
Maurice W Long(
Book
)
1 edition published in 1999 in English and held by 5 WorldCat member libraries worldwide
Probabilistic structural analysis methods provide a means to quantify the inherent risk of a design and assess the sensitivities of design variables. This report is intended to introduce the subject of probabilistic analysis to engineers in the aerospace industry as well as act as a reference to guide those applying this technology. The current (deterministic) structural analysis approach is described, and its shortcomings are pointed out. The evolution of probabilistic analysis is presented, and the basic theory is discussed and explained via examples. Aerospace industry method development is described in detail, along with associated aerospace applications. An in-depth explanation of one industry method (Northrop Grumman) is given, along with an example run of their computer program. The report concludes with a consensus of potential benefits as well as potential issues of concern that must be addressed by those using these analysis methods
1 edition published in 1999 in English and held by 5 WorldCat member libraries worldwide
Probabilistic structural analysis methods provide a means to quantify the inherent risk of a design and assess the sensitivities of design variables. This report is intended to introduce the subject of probabilistic analysis to engineers in the aerospace industry as well as act as a reference to guide those applying this technology. The current (deterministic) structural analysis approach is described, and its shortcomings are pointed out. The evolution of probabilistic analysis is presented, and the basic theory is discussed and explained via examples. Aerospace industry method development is described in detail, along with associated aerospace applications. An in-depth explanation of one industry method (Northrop Grumman) is given, along with an example run of their computer program. The report concludes with a consensus of potential benefits as well as potential issues of concern that must be addressed by those using these analysis methods
National coverage for emergency Mayday systems by David Richardson(
Book
)
2 editions published between 1996 and 1997 in English and held by 5 WorldCat member libraries worldwide
2 editions published between 1996 and 1997 in English and held by 5 WorldCat member libraries worldwide
Classic Grumman F-14 Tomcat films(
Visual
)
in English and held by 5 WorldCat member libraries worldwide
A compilation of Grumman films from 1973 to 1990 tracing the history of the F-14 Tomcat and other Grumman airplanes
in English and held by 5 WorldCat member libraries worldwide
A compilation of Grumman films from 1973 to 1990 tracing the history of the F-14 Tomcat and other Grumman airplanes
Interference resistance signals for collision avoidance radar by Mark Hischke(
Book
)
2 editions published in 1996 in English and held by 4 WorldCat member libraries worldwide
2 editions published in 1996 in English and held by 4 WorldCat member libraries worldwide
Advanced technology transit bus : final test report for ATTB prototypes by H. L Reutter(
Book
)
2 editions published in 1999 in English and held by 3 WorldCat member libraries worldwide
2 editions published in 1999 in English and held by 3 WorldCat member libraries worldwide
UAV systems : shaping the 21st century : benefits, opportunities and challenges : 1-2 February 2005, London UK(
)
1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide
Space primer(
Book
)
2 editions published between 2006 and 2009 in English and held by 2 WorldCat member libraries worldwide
2 editions published between 2006 and 2009 in English and held by 2 WorldCat member libraries worldwide
USS Monitor, Turret Arrival Ceremony at The Mariners' Museum, C02-208-46 by
Northrop Grumman Corporation(
Visual
)
1 edition published in 2002 in English and held by 1 WorldCat member library worldwide
1 edition published in 2002 in English and held by 1 WorldCat member library worldwide
Advanced electronic monitoring for tracking persons on probation or parole : final report(
Book
)
1 edition published in 1996 in English and held by 1 WorldCat member library worldwide
1 edition published in 1996 in English and held by 1 WorldCat member library worldwide
more

fewer

Audience Level
0 |
![]() |
1 | ||
General | Special |

- United States Congress House Committee on Government Reform
- United States White House Office
- U.S. Army Research Institute for the Behavioral and Social Sciences
- Boeing Company
- United States Government Accountability Office
- Monitor (Ironclad : 1862)
- Sandia National Laboratories
- Jacob, Bruce
- Intel Corporation
- Association for Computing Machinery
Useful Links
Associated Subjects
Aerospace industries Aircraft carriers--Design and construction Airplanes, Tailless Airplanes--Certification Airplanes--Crashworthiness Airplanes--Materials Airtankers (Military science) B-2 bomber Boats and boating Boeing Company California Chief executive officers Composite materials Construction equipment Defense industries Electronic mail messages Electronic mail systems--Management General Dynamics Corporation Grumman airplanes High technology industries Information resources Leadership Learning Management Medicine, Military Navigation Northrop, John Knudsen, Northrop aircraft Northrop Aircraft, Inc Northrop Corporation Northrop Grumman Corporation Probabilities Public contracts Shipbuilding Shipbuilding--Equipment and supplies Shipbuilding industry Ships Shipyards Social groups Software engineering Soldiers--Training of Stealth aircraft Telecommunication systems Tomcat (Jet fighter plane) Training United States United States.--White House Office Virginia--Newport News Virtual reality in medicine Yurok Indians
Covers
Alternative Names
Newport News Shipbuilding and Dry Dock Company
NOC
Northrop Grumman americká firma
Northrop Grumman amerikanskt företag inom försvars- respektive rymdfartsindustrin
Northrop Grumman bedrijf in Verenigde Staten van Amerika
Northrop Grumman conglomerado aeroespacial y armamentista estadounidense
Northrop Grumman constructeur aéronautique américain
Northrop Grumman Corporation
Northrop Grumman Corporation amerikansk fly- og krigsmaterielproducent
Northrop Grumman Corporation Amerykański koncern technologiczny i obronny
Northrop Grumman Hava ve savunma teknolojisi şirketi
Northrop Grumman US-amerikanischer Hersteller von Rüstungstechnik und Sortiertechnik für Briefe
Northrop Grumman yhdysvaltalainen ilmailu- ja puolustusteollisuusalan yritys
Нортроп Груман
נורת'רופ גראמן תאגיד אמריקאי המייצר כלי טיס, כלי שיט, מוצרים ביטחוניים, אמצע לחימה, מכ"מים ועוד
شركة نورثروب
نورتروپ گرومن شرکت هوافضا و صنایع دفاعی و نظامی آمریکایی
نورثروب غرومان شركة أمريكية
নরথ্রপ গ্রামেন মার্কিন বায়বাকাশ ও প্রতিরক্ষা প্রযুক্তি কর্পোরেশন
നോർത്രോപ് ഗ്രുമൻ
นอร์ทธรอป กรัมแมน
노스럽 그러먼
ノースロップ・グラマン アメリカの軍需産業関連企業
諾斯洛普·格拉曼
诺斯洛普·格鲁门
Languages