Latest Additions to the Library
Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...
Model-Based Engineering with AADL introduces an architecture-centric approach to discovering software systems problems earlier, when they cost less to solve.
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...
This book describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by senior officials within any organization.
Best Practices for Artifact Versioning in Service-Oriented Systems
This report describes some of the challenges of software versioning in an SOA environment and provides guidance on how to meet these challenges by following industry guidelines and recommended practices.