Search the Library

The SEI has published a variety of resources to the software community for over 20 years.  Search for information related to any of the following criteria:

Find a resource

Keyword
Title
Author
By Area of Work
Report Number
(ex: SEI-2009-TR-XXX)

Refine your search

By Resource Type: Select All | Clear All

Annual Reports
Books
Brochures
DVDs
News At Sei
Newsletters
Audio
Podcasts
Presentations
Reports
Videos
Webinars
White Papers
News
Announcements
Press Releases

Latest Additions to the Library

Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination

This technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and...

Issues and Opportunities for Improving the Quality and Use of Data in the Department of Defense

The Office of the Secretary of Defense for Acquisition, Technology, and Logistics (OSD [AT&L]), Director, Defense Research & Engineering (DDR&E) sponsored a workshop to bring together leading researchers and practitioners...

CMMI for Services: Guidelines for Superior Service, Second Edition

This book serves as an introduction to the CMMI-SVC model and contains a comprehensive set of guidelines to help organizations establish and improve their delivering services.

Emerging Technologies for Software-Reliant Systems of Systems

The purpose of this report is to present an informal survey of technologies that are, or are likely to become, important for software-reliant systems of systems in response to current...

Acquisition Archetypes: Brooks' Law

This April 2009 whitepaper focuses on the problems of underspending, which can result in funds being shifted from one acquisition program to another.


Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.