Showing 1 - 10 of 19 results for the Publish Year - 2011 , Type - White Paper
In this paper, the authors describe a Security Information and Event Management signature for detecting possible malicious insider activity.
In this paper, the authors describe the development of a secure coding module that shows how to capture content, ensure learning, and scale to meet demand.
Learn how to look into the initial steps suggested for delivering software-reliant products faster.
Learn how to deliver software-reliant products faster and explore ways to use software architecture more effectively.
A short white paper that provides guidance on selecting the best CMMI model for process improvement.
In this paper, the authors discuss confidence in system and SoS behavior and how theories can be used to make the assurance process more effective.
These papers were presented at FloCon 2011, where participants discussed dark space, web servers, spam, and the susceptibility of DNS servers to cache poisoning.
In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.
This whitepaper argues that there is an opportunity to study and improve the “technical debt” metaphor concept and offers software engineers a foundation for managing such trade-offs based on models of their economic impacts.
In this paper, the authors describe the risks of being victims of theft, including becoming involved unknowingly in illegal activities over a networked device.