Latest Additions to the Library
Resource Allocation in Dynamic Environments
When warfighting missions are conducted in a dynamic environment, the allocation of resources needed for mission operation can change from moment to moment. This report addresses two challenges of resource...
This technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and...
IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009
This March 2011 report provides an overview of Infosys Technologies Limited and its practices, which led to the company receiving the IEEE’s SPA Award in 2009.
An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases
This report provides an overview of techniques employed by malicious insiders to steal intellectual property, including the types of assets targeted and the methods used to remove the information from...
Relating Business Goals to Architecturally Significant Requirements for Software Systems
This report attempts to facilitate better elicitation of high-pedigree quality attribute requirements by understanding how business goals influence quality attribute requirements and architectures.