Browse by Type

To browse by library resource type, select from the list to the right. Library assets are in descending order by publication date.

Most Recent Report

Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination

This technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and indexing engine Splunk to detect malicious insider behavior on a...

Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination

Most Recent Presentation

Characterizing Technical Software Performance Within System of Systems Acquisitions: A Step-Wise Methodology

Bryce Meyer and James Wessel provide a 10-step method for planning/assessing software performance, allowing for respective improvement of architecture and test processes.

Characterizing Technical Software Performance Within System of Systems Acquisitions: A Step-Wise Methodology

Most Recent Webinar

Cloud Computing

This on-demand webinar gives an introductory view of cloud computing, a paradigm being adopted by commercial, government and DoD organizations(58 mins).

Cloud Computing

Find Us Here

Find us on Youtube  Find us on LinkedIn  Find us on twitter  Find us on Facebook

Share This Page

Share on Facebook  Send to your Twitter page  Save to del.ico.us  Save to LinkedIn  Digg this  Stumble this page.  Add to Technorati favorites  Save this page on your Google Home Page 

For more information

Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.