1

Maturity, models, and goals: How to build a metrics plan

Year:
1995
Language:
english
File:
PDF, 1.45 MB
english, 1995
2

A framework for security requirements

Year:
1991
Language:
english
File:
PDF, 900 KB
english, 1991
3

Useful Cybersecurity Metrics

Year:
2009
Language:
english
File:
PDF, 944 KB
english, 2009
4

Experimental design and analysis in software engineering

Year:
1995
Language:
english
File:
PDF, 1.91 MB
english, 1995
5

Principles of survey research

Year:
2002
Language:
english
File:
PDF, 431 KB
english, 2002
6

Design and analysis in software engineering

Year:
1994
Language:
english
File:
PDF, 389 KB
english, 1994
7

A methodology for penetration testing

Year:
1989
Language:
english
File:
PDF, 814 KB
english, 1989
8

Leveraging behavioral science to mitigate cyber security risk

Year:
2012
Language:
english
File:
PDF, 339 KB
english, 2012
9

Measuring reuse: a cautionary tale

Year:
1996
Language:
english
File:
PDF, 1.88 MB
english, 1996
10

Software Metrics: Progress after 25 Years?

Year:
2008
Language:
english
File:
PDF, 330 KB
english, 2008
11

Books

Year:
1998
Language:
english
File:
PDF, 1.03 MB
english, 1998
13

Anatomy of an Intrusion

Year:
2010
Language:
english
File:
PDF, 710 KB
english, 2010
15

Experimental design and analysis in software engineering, part 5

Year:
1995
Language:
english
File:
PDF, 418 KB
english, 1995
16

Executive mentoring

Year:
1995
Language:
english
File:
PDF, 3.98 MB
english, 1995
17

Software metrics in the process maturity framework

Year:
1990
Language:
english
File:
PDF, 703 KB
english, 1990
20

Risky business: what we have yet to learn about risk management

Year:
2000
Language:
english
File:
PDF, 142 KB
english, 2000
24

Using multiple metrics for analysis of improvement

Year:
1992
Language:
english
File:
PDF, 725 KB
english, 1992
26

Wavefront: a goal-driven requirements process model

Year:
1996
Language:
english
File:
PDF, 1.42 MB
english, 1996
27

Desert Island Column

Year:
1997
Language:
english
File:
PDF, 25 KB
english, 1997
28

Addressing the Insider Threat

Year:
2009
Language:
english
File:
PDF, 1.29 MB
english, 2009
29

Guest Editors' Introduction

Year:
2012
Language:
english
File:
PDF, 1.92 MB
english, 2012
31

A Key to the Castle

Year:
2012
Language:
english
File:
PDF, 643 KB
english, 2012
32

Books

Year:
1997
Language:
english
File:
PDF, 1.08 MB
english, 1997
33

Principles of survey research part 6

Year:
2003
Language:
english
File:
PDF, 252 KB
english, 2003
34

Principles of survey research

Year:
2002
Language:
english
File:
PDF, 475 KB
english, 2002
35

Principles of survey research

Year:
2001
Language:
english
File:
PDF, 331 KB
english, 2001
36

The Eyes Have It: Surveillance and How It Evolved

Year:
2014
Language:
english
File:
PDF, 1005 KB
english, 2014
37

Choosing a Security Option: The InfoSecure Methodology

Year:
2008
Language:
english
File:
PDF, 472 KB
english, 2008
38

Ramsey theory: Learning about the needle in the haystack

Year:
2013
Language:
english
File:
PDF, 119 KB
english, 2013
39

Insiders Behaving Badly

Year:
2008
Language:
english
File:
PDF, 151 KB
english, 2008
40

Security Measurement Steps, Missteps, and Next Steps

Year:
2012
Language:
english
File:
PDF, 224 KB
english, 2012
41

Principles of survey research part 4

Year:
2002
Language:
english
File:
PDF, 471 KB
english, 2002
42

Expanding to Meet Readers' Needs

Year:
2014
Language:
english
File:
PDF, 827 KB
english, 2014
44

Experimental design and analysis in software engineering

Year:
1995
Language:
english
File:
PDF, 513 KB
english, 1995
45

Experimental Design and Analysis in Software Engineering

Year:
1995
Language:
english
File:
PDF, 318 KB
english, 1995
46

Experimental design and analysis in software engineering, part 4

Year:
1995
Language:
english
File:
PDF, 311 KB
english, 1995
47

Principles of survey research part 2

Year:
2002
Language:
english
File:
PDF, 342 KB
english, 2002