资讯
The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source ...
CERT Division at Carnegie Mellon University's Software Engineering Institute. He has supported national security efforts for over 10 years in civilian, military, and contractor roles. Before joining ...
The individuals listed below have earned an SEI certificate and requested that the SEI include their information on this list. You can earn an SEI certificate by completing a set curriculum in a ...
Firesmith, D., 2013: Using V Models for Testing. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed September 10, 2025, https ...
The CERT Division is a leader in cybersecurity. We partner with government, industry, law enforcement, and academia to improve the security and resilience of computer systems and networks. We study ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Dormann, W., 2015: The Risks of SSL Inspection. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed September 8, 2025, https://www ...
Access and download the software, tools, and methods that the SEI creates, tests, refines, and disseminates. Organizations and individuals worldwide use these technologies and management techniques to ...
The annual SEI Architecture Technology User Network (SATURN) conference brought together an international audience of practicing software architects, industry thought leaders, developers, technical ...
This book offers specific guidance and countermeasures on insider threat that can be immediately applied within any private, government, or military organization. Since 2001, the CERT® Insider Threat ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果