Latest Additions to the Library
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...
The SCAMPI Method Definition Document describes the requirements, activities, and practices associated with each of the processes that compose the SCAMPI method. It is intended to be one of the...
Trust and Trusted Computing Platforms
This technical note examines the Trusted Platform Module, which arose from work related to the Independent Research and Development project "Trusted Computing in Extreme Adversarial Environments: Using Trusted Hardware as...
Reflections on Management: How to Manage Your Software Projects, Your Teams, Your Boss, and Yourself
This book brings together Watts S. Humphrey's most influential essays and articles, sharing insights that are essential for anyone who must achieve quality results in software management.
A Proactive Means for Incorporating a Software Architecture Evaluation in a DoD System Acquisition
This technical note provides guidance on how to contractually incorporate architecture evaluations in an acquisition.