To browse by library resource type, select from the list to the right. Library assets are in descending order by publication date.
An Analysis of Technical Observations in Insider Theft of Intellectual Property CasesThis report provides an overview of techniques employed by malicious insiders to steal intellectual property, including the types of assets targeted and the methods used to remove the information from a victim organization’s control. The report closes with a brief... |
|
Acquisition Process Improvement in Stealth Mode: is It IDEAL?This presentation was given by Joe Wickless of the Software Engineering Institute (SEI) in March 2010 at SEPG North America 2009, held in San Jose, CA. |
|
Cloud ComputingThis on-demand webinar gives an introductory view of cloud computing, a paradigm being adopted by commercial, government and DoD organizations(58 mins). |
|
Find Us Here
For more information