Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Mcintire, David"'
Publikováno v:
UMK access.
Thesis (D.M.A.)--Conservatory of Music and Dance. University of Missouri--Kansas City, 2009.
For two trumpets and chamber ensemble with electronic sounds. "A dissertation in music composition." Advisor: Paul Rudy. Typescript. Vita. Title from "c
For two trumpets and chamber ensemble with electronic sounds. "A dissertation in music composition." Advisor: Paul Rudy. Typescript. Vita. Title from "c
The U.S. Department of State, Office of the Coordinator for Cyber Issues commissioned the Software Engineering Institute (SEI) to create the Sector CSIRT Framework for (1) developing a sector-based computer security incident response and coordination
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f0a511b1c98b3646b68565d30d9a778
Autor:
Dorofee, Audrey, Ruefle, Robin, Zajicek, Mark, Alberts, Christopher, Perl, Samuel, Huth, Carly Lauren, Walters, Pennie, McIntire, David
NOTE: This report supersedes Incident Management Capability Metrics Version 0.1 CMU/SEI-2007-TR-008 | DOI:10.1184/R1/6574292.v1 This report is superseded by An Introduction to the Mission Risk Diagnostic for Incident Management Capabilities (MRD-IMC)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2e9818a3293033cfcf265ad1db673dcb
Workforce effectiveness relies on two critical characteristics: competence and readiness. Competence is the sufficient mastery of the knowledge, skills, and abilities needed to perform a given task. It reflects how well an individual understands subj
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::181d21219c9b705b781efbf74a324aed
Autor:
McIntire, David1 (AUTHOR) dmcintire@apu.edu
Publikováno v:
Christian Higher Education. Jan-Mar2010, Vol. 9 Issue 1, p71-81. 11p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Despite the high impact of insider attacks, organizations struggle to implement effective insider threat programs. In addition to the mandate for all Department of Defense (DOD) and U.S. Government agencies to build such programs, approval of updates
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::34406e3cec51fc704bb5eeca93012ce0
Autor:
Andersson, Bjorn A, Bellomo, Stephany, Brownsword, Lisa, Chaki, Sagar J, Claycomb, William, Cohen, Corey, Cohen, Julie, Feiler, Peter, Ferguson, Robert W., Flynn, Lori, Gluch, David, Goldenson, Dennis, Gurfinkel, Arie, Hines, Charles, Havrilla, Jeffrey S., Huth, Carly, Jin, Wesley, Kazman, Rick, Lapham, Mary Ann, McCurley, James, McGregor, John D., McIntire, David, Nord, Robert, Ipek Ozkaya, Stoddard, Robert W., Zubrow, David
The Software Engineering Institute (SEI) annually undertakes several line-funded exploratory new starts (LENS) projects. These projects serve to (1) support feasibility studies investigating whether further work by the SEI would be of potential benef
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1070fa273b955f94f1a35f37577e9e02
This paper describes an analysis that justifies applying the pattern “Increased Review for Intellectual Property (IP) Theft by Departing Insiders.” The pattern helps organizations plan, prepare, and implement a strategy to mitigate the risk of in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fa2c302b1070ea0d496ce9e149141b9f