Latest Additions to the Library
Insider Fraud in Financial Services
This brochure presents a summary of the findings of a recent study that analyzed insider and outsider computer criminal activity in the financial services sector to help security professionals prevent,...
This book describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by senior officials within any organization.
A Preliminary Model of Insider Theft of Intellectual Property
This report presents research about insider theft of intellectual property.
Trusted Computing in Embedded Systems Workshop
This report describes the November 2010 Trusted Computing in Embedded Systems Workshop held at Carnegie Mellon University.
Combining Architecture-Centric Engineering with the Team Software Process
ACE methods and the TSP provides an iterative approach for delivering high quality systems on time and within budget. The combined approach helps organizations that must set an architecture/developer team...