Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

John Kochmar
February 1999 - Security Improvement Module Securing Desktop Workstations

Authors: Derek Simmel, Gary Ford, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

The practices recommended in this 1999 report are designed to help you configure and deploy networked workstations that satisfy your organization‰s security requirements. The practices may also be useful in examining the configuration of previously deployed workstations.

February 1999 - Security Improvement Module Responding to Intrusions

Authors: Klaus-Peter Kossakowski, William R. Wilson, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

This 1999 report is one of a series of SEI publications that are intended to provide practical guidance to help organizations improve the security of their networked computer systems. This report is intended for system and network administrators, managers of information systems, and security personnel responsible for networked information resources.

February 1999 - Security Improvement Module Securing Network Servers (1999)

Authors: Gary Ford, Dwayne Vermeulen, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.

June 1998 - Security Improvement Module Detecting Signs of Intrusion

Authors: Lisa Cunningham, Robert Firth, Barbara Fraser, John Kochmar, John Richael, Derek Simmel, Gary Ford, Suresh Konda

The 1998 report provides guidance to help organizations improve the security of their networked computer systems.

June 1998 - Security Improvement Module Preparing to Detect Signs of Intrusion

Authors: John Kochmar, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.

January 1998 - Security Improvement Module Security for Information Technology Service Contracts

Authors: Julia H. Allen, Gary Ford, Barbara Fraser, John Kochmar, Suresh Konda, Derek Simmel, Lisa Cunningham

This 1998 document is one of a new series of publications of the Software EngineeringInstitute at Carnegie Mellon University,security improvement modules.They are intended to provide concrete, practical guidance that will help organizationsimprove the security of their networked computer systems.

March 1987 - Technical Report Evaluation of ADA Environments, Executive Summary

Authors: Nelson W. Weiderman, Neal Altman, Mark W. Borger, Mark H. Klein, Stefan F. Landherr, Roger Smeaton, Rich D'Ippolito, John Kochmar, Alice Sun

This 1987 report provides a detailed description of the Ada Environments methodology and examples of its usage.