Latest Additions to the Library
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
This report describes a new insider threat study in which researchers extracted technical and behavioral patterns from fraud cases and developed insights and risk indicators of malicious insider activity within...
IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009
This March 2011 report provides an overview of Infosys Technologies Limited and its practices, which led to the company receiving the IEEE’s SPA Award in 2009.
CMMI for Acquisition, Second Edition is the definitive reference for CMMI-ACQ Version 1.3. This book describes best practices for the successful acquisition of products and services.
Status of Ongoing Work in Software TRAs/TRLs
In this 2010 presentation, Michael Bandor and Suzanne Garcia-Miller focus on software issues and shortfalls observed during the DoD Technology Readiness Assessment (TRA) processes.
Selecting Middleware Technologies
presentation made by Patricia Oberndorf Thomas Merendino, & Soumya Simanta at the at the Systems and Software Technology Conference, Salt Lake City, UT, April 26, 2010