Latest Additions to the Library
Keeping Your Family Safe in a Highly Connected World
Because of the anonymity provided by networked devices, our families are more likely to be attacked, be victims of theft, be subjected to inappropriate people or materials, or become involved unknowingly in...
CERT Resilience Management Model: A Maturity Model for Managing Operational Resilience
This book presents best practices for managing the security and survivability of people, information, technology, and facilities. It integrates these into a unified CMM that encompasses security, business continuity, and...
Evaluating and Mitigating Software Supply Chain Security Risks
This 2010 report identifies software supply chain security risks and specifies the evidence that must be gathered to determine whether these risks have been mitigated.
Keynote presentation by Donald Firesmith at SESS’10, as part of the 32nd ACM/IEEE International Conference on Software Engineering (ISCE’2010) in Cape Town, South Africa.
Agile Development & Software Architecture - Crossing the Great Divide (Webinar)
In this webinar, we will take a journey to each camp to dispel misconceptions and discuss how Agilists and Architects can learn from and benefit each other.