-
2
-
-
79960172545
-
Shadows in the cloud: Investigating cyber espionage 2.0
-
Toronto
-
S. Adair, R. Deibert, R. Rohozinski, and, G. Walton, Shadows in the cloud: Investigating cyber espionage 2.0, A joint report of the Information Warfare Monitor and Shadowserver Foundation, Toronto, 2010.
-
(2010)
A Joint Report of the Information Warfare Monitor and Shadowserver Foundation
-
-
Adair, S.1
Deibert, R.2
Rohozinski, R.3
Walton, G.4
-
3
-
-
0008942383
-
-
2nd edition, Wiley, Hoboken, NJ
-
R. Anderson, Security engineering, 2nd edition, Wiley, Hoboken, NJ, 2008.
-
(2008)
Security Engineering
-
-
Anderson, R.1
-
4
-
-
34848837946
-
Pattern-driven architectural partitioning, balancing functional and non-functional requirements
-
P. Avgeriou, and, N. Harrison, Pattern-driven architectural partitioning, balancing functional and non-functional requirements, Second Int Conf Digital Telecommun, IEEE, 2007.
-
(2007)
Second Int Conf Digital Telecommun, IEEE
-
-
Avgeriou, P.1
Harrison, N.2
-
5
-
-
79960193626
-
Systems security engineering: A critical discipline of systems engineering
-
K. Baldwin, Systems security engineering: A critical discipline of systems engineering, INCOSE INSIGHT 12 (2009), 11-13.
-
(2009)
INCOSE INSIGHT
, vol.12
, pp. 11-13
-
-
Baldwin, K.1
-
6
-
-
84869139034
-
-
Systems Engineering Research Center Stevens Institute of Technology, Hoboken, NJ
-
J. Bayuk, D. Barnabe, J. Goodnight, D. Hamilton, B. Horowitz, C. Newman, and, S. Tarchalski, Systems security engineering roadmap, final technical report, Systems Engineering Research Center (www.sercuarc.org), Stevens Institute of Technology, Hoboken, NJ, 2010.
-
(2010)
Systems Security Engineering Roadmap, Final Technical Report
-
-
Bayuk, J.1
Barnabe, D.2
Goodnight, J.3
Hamilton, D.4
Horowitz, B.5
Newman, C.6
Tarchalski, S.7
-
7
-
-
0013080980
-
-
Pearson Education, Upper Saddle River, NJ
-
M. Bishop, Computer security, art and science, Pearson Education, Upper Saddle River, NJ, 2003.
-
(2003)
Computer Security, Art and Science
-
-
Bishop, M.1
-
9
-
-
0003428503
-
-
Wiley, Hoboken, NJ
-
D.M. Buede, The engineering design of systems, models and methods, Wiley, Hoboken, NJ, 2009.
-
(2009)
The Engineering Design of Systems, Models and Methods
-
-
Buede, D.M.1
-
11
-
-
34249853372
-
Applying pattern concepts to systems (enterprise) architecture
-
R. Cloutier, and, D. Verma, Applying pattern concepts to systems (enterprise) architecture, J Enterprise Architects 2 (2) (2006), 138-154.
-
(2006)
J Enterprise Architects
, vol.2
, Issue.2
, pp. 138-154
-
-
Cloutier, R.1
Verma, D.2
-
12
-
-
62649134605
-
-
Defense Science Board, Department of Defense, Washington, DC
-
Defense Science Board, High performance microchip supply, Department of Defense, Washington, DC, 2005.
-
(2005)
High Performance Microchip Supply
-
-
-
13
-
-
84861313457
-
-
US Department of Defense, Washington, DC
-
DoD, MIL-HDBK-1785, System security engineering program management requirements, US Department of Defense, Washington, DC, 1995.
-
(1995)
DoD, MIL-HDBK-1785, System Security Engineering Program Management Requirements
-
-
-
14
-
-
79960199989
-
-
US Department of Defense, Washington, DC
-
DoD, Information assurance workforce improvement program, DoD 8570.01-M, US Department of Defense, Washington, DC, 2005.
-
(2005)
DoD, Information Assurance Workforce Improvement Program, DoD 8570.01-M
-
-
-
15
-
-
79960154013
-
-
Washington, DC
-
DoD, The Under Secretary of Defense for Acquisition Technology and Logistics and The Assistant Secretary of Defense for Networks and Information Integration DoD Chief Information Officer, Report on trusted defense systems, Department of Defense, Washington, DC, 2009.
-
(2009)
DoD, the under Secretary of Defense for Acquisition Technology and Logistics and the Assistant Secretary of Defense for Networks and Information Integration DoD Chief Information Officer, Report on Trusted Defense Systems, Department of Defense
-
-
-
16
-
-
79960170480
-
On discovery and display of agile security patterns
-
Stevens Institute of Technology, Hoboken, NJ
-
R. Dove, and, L. Shirey, On discovery and display of agile security patterns, Conf Syst Eng Res, Stevens Institute of Technology, Hoboken, NJ, 2010.
-
(2010)
Conf Syst Eng Res
-
-
Dove, R.1
Shirey, L.2
-
17
-
-
42149110618
-
-
US Department of Homeland Security, Washington, DC
-
FEMA, National response framework: Overview, US Department of Homeland Security, Washington, DC, 2008.
-
(2008)
FEMA, National Response Framework: Overview
-
-
-
18
-
-
0010729284
-
-
2nd edition, Microsoft Press, Seattle, WA
-
M. Howard, Writing secure code, 2nd edition, Microsoft Press, Seattle, WA, 2002.
-
(2002)
Writing Secure Code
-
-
Howard, M.1
-
21
-
-
79960153227
-
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsystems security engineeringCcapability maturity model, sse-cmm, ISO/IEC 28127, Geneva, Switzerland, 2002
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsystems security engineeringCcapability maturity model, sse-cmm, ISO/IEC 28127, Geneva, Switzerland, 2002.
-
-
-
-
22
-
-
79960186978
-
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCinformation security management systemsCrequirements, ISO/IEC 27001, International Standards Organization, Geneva, Switzerland, 2005a
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCinformation security management systemsCrequirements, ISO/IEC 27001, International Standards Organization, Geneva, Switzerland, 2005a.
-
-
-
-
23
-
-
79960183140
-
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCcode of practice for information security management, ISO/IEC 27002, Geneva, Switzerland, 2005b
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Information technologyCsecurity techniquesCcode of practice for information security management, ISO/IEC 27002, Geneva, Switzerland, 2005b.
-
-
-
-
24
-
-
79960164955
-
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Systems and software engineeringCsystems and software assuranceCpart 2: Assurance case, ISO/IEC 15026, Geneva, Switzerland, 2009
-
ISO/IEC (International Organization for Standardization/International Electrotechnical Commission), Systems and software engineeringCsystems and software assuranceCpart 2: Assurance case, ISO/IEC 15026, Geneva, Switzerland, 2009.
-
-
-
-
26
-
-
77958191030
-
-
McGraw Hill, New York
-
W. Larson, D. Kirkpatrick, J. J. Sellers, D. Thomas, and, D. Verma, Applied space systems engineering, McGraw Hill, New York, 2009.
-
(2009)
Applied Space Systems Engineering
-
-
Larson, W.1
Kirkpatrick, D.2
Sellers, J.J.3
Thomas, D.4
Verma, D.5
-
27
-
-
51849117996
-
FBI says the military had bogus computer gear
-
May 9, 2008
-
J. Markoff, FBI says the military had bogus computer gear, The New York Times, May 9, 2008.
-
The New York Times
-
-
Markoff, J.1
-
28
-
-
77949842100
-
-
O'Reilly, Sebastopol, CA
-
T. Mather, S. Kumaraswamy, and, S. Latif, Cloud security and privacy: An enterprise perspective on risks and compliance, O'Reilly, Sebastopol, CA, 2009.
-
(2009)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
29
-
-
78449232020
-
-
Perseus Books Group, Jackson, TN
-
J. Menn, Fatal system error, Perseus Books Group, Jackson, TN, 2010.
-
(2010)
Fatal System Error
-
-
Menn, J.1
-
30
-
-
79960163679
-
Using the U.S. Department of Defense architecture framework to build security into the lifecycle
-
W.P. Mulokey, Using the U.S. Department of Defense architecture framework to build security into the lifecycle, INCOSE Insight, 12 (2009), 27-29.
-
(2009)
INCOSE Insight
, vol.12
, pp. 27-29
-
-
Mulokey, W.P.1
-
31
-
-
79960197814
-
-
version 1.2, Wakefield, MA
-
PCI, Payment Card Industry (PCI) Security Standards Council, Payment card industry (pci) data security standard, version 1.2, Wakefield, MA, 2008.
-
(2008)
PCI, Payment Card Industry (PCI) Security Standards Council, Payment Card Industry (Pci) Data Security Standard
-
-
-
32
-
-
24944551836
-
-
National Institute of Standards and Technology, Gaithersburg, MD
-
R. Ross, S. Katzke, A. Johnson, M. Swanson, G. Stoneburner, and, G. Rogers, Recommended security controls for federal information systems, sp 800-53 rev 2, National Institute of Standards and Technology, Gaithersburg, MD, 2007.
-
(2007)
Recommended Security Controls for Federal Information Systems, Sp 800-53 Rev 2
-
-
Ross, R.1
Katzke, S.2
Johnson, A.3
Swanson, M.4
Stoneburner, G.5
Rogers, G.6
-
33
-
-
33750050331
-
-
Wiley, Hoboken, NJ
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and, P. Sommerlad, Security patterns, integrating security and systems engineering, Wiley, Hoboken, NJ, 2006.
-
(2006)
Security Patterns, Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
34
-
-
79960168235
-
-
US Comptroller General, Report to Chairman, Committee on Government Operations, House of Representatives of the United States, Washington, DC, May 1981
-
US Comptroller General, Report to Chairman, Committee on Government Operations, House of Representatives of the United States, Washington, DC, May 1981.
-
-
-
-
36
-
-
79960154842
-
-
F.D. Kramer, S.H. Starr, and L. Wentz (Editors), Potomac Books, Dulles, VA Chap. 18
-
C. Wilson, ACybercrime,@ Cyberpower and national security, F.D. Kramer, S.H. Starr, and L. Wentz (Editors), Potomac Books, Dulles, VA, 2009, Chap. 18.
-
(2009)
A Cybercrime,@ Cyberpower and National Security
-
-
Wilson, C.1
-
37
-
-
72449180476
-
Reflections on cyber security
-
W. Wulf, and, A. Jones, Reflections on cyber security, Sci Mag 326 (2009), 943-944.
-
(2009)
Sci Mag
, vol.326
, pp. 943-944
-
-
Wulf, W.1
Jones, A.2
|