Latest Additions to the Library
Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...
This report presents methods to audit USB device use within a Microsoft Windows environment.
Analyzing Cases of Resilience Success and Failure—A Research Study
This report describes the SEI research study aimed at helping organizations to know the business value of implementing resilience processes and practices, and determine which ones to implement.
This paper discusses the natural tension between rapid fielding and response to change (characterized as agility) and DoD information assurance policy. Data for the paper was gathered through interviews with...
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...