To browse by library resource type, select from the list to the right. Library assets are in descending order by publication date.
Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider TerminationThis technical note presents an insider threat pattern on how organizations can combat insider theft of intellectual property. The technical note describes how to use the centralized log storage and indexing engine Splunk to detect malicious insider behavior on a... |
|
Characterizing Technical Software Performance Within System of Systems Acquisitions: A Step-Wise MethodologyBryce Meyer and James Wessel provide a 10-step method for planning/assessing software performance, allowing for respective improvement of architecture and test processes. |
|
Cloud ComputingThis on-demand webinar gives an introductory view of cloud computing, a paradigm being adopted by commercial, government and DoD organizations(58 mins). |
|
For more information