Latest Additions to the Library
This document, first in the Best Practices for National Cyber Security series, provides information that interested organizations and governments can use to develop a national incident management capability.
This report explores the value of enhancing typical strategic planning techniques with the CSF method and scenario planning.
We Have All Been Here Before: Recurring Patterns Across 12 U.S. Air Force Acquisition Programs
presentation given by William Novak and Ray Williams at the 2010 Systems and Software Technology Conference (SSTC) on April 29, 2010
Status of Ongoing Work in Software TRAs/TRLs
In this 2010 presentation, Michael Bandor and Suzanne Garcia-Miller focus on software issues and shortfalls observed during the DoD Technology Readiness Assessment (TRA) processes.
Realizing and Refining Architectural Tactics: Availability
Tactics are fundamental elements of software architecture that an architect employs to meet a system's quality requirements. This report describes an updated set of tactics that enable the architect to...