Latest Additions to the Library
Spotlight On: Malicious Insiders and Organized Crime Activity
This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.
Software Assurance Curriculum Project Volume III: Master of Software Assurance Course Syllabi
This report, the third volume in the Software Assurance Curriculum Project sponsored by the U.S. Department of Homeland Security, provides sample syllabi for the nine core courses in the Master...
Combining Architecture-Centric Engineering with the Team Software Process
ACE methods and the TSP provides an iterative approach for delivering high quality systems on time and within budget. The combined approach helps organizations that must set an architecture/developer team...
Success in Acquisition: Using Archetypes to Beat the Odds
This report describes key elements in systems thinking, provides an introduction to general systems archetypes, and applies these concepts to the software acquisition domain.
A Proactive Means for Incorporating a Software Architecture Evaluation in a DoD System Acquisition
This technical note provides guidance on how to contractually incorporate architecture evaluations in an acquisition.