Latest Additions to the Library
This technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and...
The SCAMPI Method Definition Document describes the requirements, activities, and practices associated with each of the processes that compose the SCAMPI method. It is intended to be one of the...
Testing in Service-Oriented Environments
This 2010 report makes several recommendations for improving testing in service-oriented environments, including testing functionality, interoperability testing, security, performance, and more.
Realizing and Refining Architectural Tactics: Availability
Tactics are fundamental elements of software architecture that an architect employs to meet a system's quality requirements. This report describes an updated set of tactics that enable the architect to...
Service Level Agreements in Service-Oriented Architecture Environments
This 2008 report surveys the state of practice in service level agreement specification and offers guidelines on how to assure that services are provided with high availability, security, performance, and...