Search the Library

The SEI has published a variety of resources to the software community for over 20 years.  Search for information related to any of the following criteria:

Find a resource

Keyword
Title
Author
By Area of Work
Report Number
(ex: SEI-2009-TR-XXX)

Refine your search

By Resource Type: Select All | Clear All

Annual Reports
Books
Brochures
DVDs
News At Sei
Newsletters
Audio
Podcasts
Presentations
Reports
Videos
Webinars
White Papers
News
Announcements
Press Releases

Latest Additions to the Library

Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments

This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...

DoD Information Assurance and Agile: Challenges and Recommendations Gathered Through Interviews with Agile Program Managers and DoD Accreditation Reviewers

This paper discusses the natural tension between rapid fielding and response to change (characterized as agility) and DoD information assurance policy. Data for the paper was gathered through interviews with...

Cloud Computing at the Tactical Edge

This technical note presents a strategy to overcome the challenges of obtaining sufficient computation power to run applications needed for warfighting and disaster relief missions. It discusses the use of...

Mission Risk Diagnostic (MRD) Method Description

The SEI has developed the Mission Risk Diagnostic (MRD) to assess risk in interactively complex, socio-technical systems across the life cycle and supply chain.

Spotlight On: Malicious Insiders and Organized Crime Activity

This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.



Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.