Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Woody, Carol C."'
Autor:
Woody, Carol C.
Publikováno v:
CEC Theses and Dissertations.
Internet connectivity has been added to the classrooms of United States (U.S .) K-12 schools, but recognition of the security risks and related management responsibilities to address increased risk exposure is not apparent. Providing a sufficient lev
Autor:
Ellison, Robert J., Woody, Carol C.
Complexity and change are pervasive in the operational environments of today's organizations. Organizational and technological components that must work together may be created, managed, and maintained by different entities around the globe. The abil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::51e65e8154fbdb0f5ed2a490d9c83a91
Autor:
Bellomo, Stephany, Woody, Carol C.
This paper was produced by the Software Engineering Institute at Carnegie Mellon University in support of the Agile acquisition research agenda funded by the Office of the Secretary of Defense. This paper is part of a larger research study focused on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::112f08282cd5b666ee052c4b635217cd
This report describes the Carnegie Mellon® Software Engineering Institute (SEI) Assurance Modeling Framework. It also discusses an initial piloting of the framework to prove its value and in-sights gained from that piloting for the adoption of selec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3593196bd6a2b0c985929161c95808ce
The Department of Defense (DoD) is concerned that security vulnerabilities could be inserted into software that has been developed outside of the DoD's supervision or control. This report presents an initial analysis of how to evaluate and mitigate t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f677c34c6cd950f57782b720a67e025
A major hurdle for complex development efforts is the lack of effective insight into problems early enough so solutions can be addressed without jeopardizing critical project and organizational constraints. Effectively addressing these challenges req
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2c931df79d97e05b5e1d96eb5815bd82
Complexity and change pervade today's organizations. Organizational and technology components that must work together may be created, managed, and maintained by different entities. Net-centric operations and service-oriented architectures will push t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0677e2594d46271d2388eb84a280d0be
Autor:
Woody, Carol C.
Security is a very visible issue these days for software. New software products are continuously reported to be vulnerable to attack and compromise; organizations must support an expensive unending update-and-upgrade cycle. Process improvement has be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c71d1e66d12d5376656914578d00208
Autor:
Woody, Carol C.
The CERT Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) method, an approach for managing information security risks, was designed to be sufficiently flexible for organizations to address unique and highly contextual analy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f25696bb687831a25fdbeb891c12d7d
Autor:
Novak, William E., Cohen, Julie, Lattanze, Anthony, Levine, Linda, Place, Patrick R., Williams, Ray C., Woody, Carol C.
Guidance about acquisition planning and strategy is scattered by topic throughout many different books, reports, presentations, and Web sites. This handbook presents guidance for acquisition planning and strategy topics in a condensed form, and refer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0db6f12a951664c802ad64c33038f1e3
https://doi.org/10.21236/ada446910
https://doi.org/10.21236/ada446910