Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 26 results for the Type - Handbook

Handbook | March 2011 - Handbook Standard CMMI Appraisal Method for Process Improvement ... By SCAMPI Upgrade Team

The SCAMPI Method Definition Document describes the requirements, activities, and practices associated with each of the processes that compose the SCAMPI method. It is intended to be one of the elements of the infrastructure within which SCAMPI Lead Appraisers conduct a SCAMPI appraisal.

Handbook | September 2006 - Handbook Defense-in-Depth: Foundations for Secure and Resilient ... By Christopher May, Josh Hammerstein, Kristopher Rush, Jeff Mattson

In this handbook, the authors provide the definitive collection of materials from the 2006 Defense-in-Depth Foundational Curriculum course.

Handbook | July 2006 - Handbook QUASAR: A Method for the Quality Assessment of Software ... By Donald Firesmith, Peter Capell, Joseph P. Elm, Michael J. Gagliardi, Timothy Morrow, Linda Roush (Naval Air Systems Command - U.S. Navy), Lui R. Sha

This 2006 handbook documents the QUASAR (QUality Assessment of System ARchitectures) method for assessing the quality of the architecture of a software-intensive system.

Handbook | December 2005 - Handbook Handbook for Conducting Standard CMMI Appraisal Method ... By Will Hayes, Gene Miluk, Lisa Ming, Margaret Glover, Members of the SCAMPI B and C Project

This 2005 document defines the boundaries of tailoring and provides guidance for the application of the SCAMPI B and SCAMPI C methods.

Handbook | December 2005 - Handbook Software Acquisition Planning Guidelines By William E. Novak, Julie B. Cohen, Anthony J. Lattanze, Linda Levine, Patrick R. Place, Ray C. Williams, Carol Woody

This 2005 handbook presents guidance for acquisition planning and strategy topics in a condensed form, and references the primary resources available for each topic.

Handbook | September 2005 - Handbook First Responders Guide to Computer Forensics: Advanced ... By Richard Nolan, Marie Baker, Jake Branson, Josh Hammerstein, Kristopher Rush, Cal Waits, Elizabeth Schweinsberg

In this 2005 handbook, the authors help technical staff members who are charged with administering and securing information systems and networks.

Handbook | September 2005 - Handbook Designing an Effective Survey By Mark Kasunic

This 2005 document presents a seven-stage, end-to-end process for conducting a survey.

Handbook | March 2005 - Handbook First Responders Guide to Computer Forensics By Richard Nolan, Colin O'Sullivan, Jake Branson, Cal Waits

In this 2005 handbook, the authors discuss collecting basic forensic data, a training gap in information security, computer forensics, and incident response.

Handbook | January 2005 - Handbook OCTAVE-S Implementation Guide, Version 1 By Cecilia Albert, Audrey J. Dorofee, James F. Stevens, Carol Woody

In this 2005 handbook, the authors provide detailed guidelines for conducting an OCTAVE-S evaluation.

Handbook | March 2004 - Handbook Advanced Information Assurance Handbook By Christopher May, Michele Baker, Derek Gabbard, Travis Good, Galen Grimes, Mark Holmgren, Richard Nolan, Robert Nowak, Sean Pennline

This handbook helps technical staff members who are charged with administering and securing information systems and networks.

Refine