1

Maturity, models, and goals: How to build a metrics plan

Year:
1995
Language:
english
File:
PDF, 1.45 MB
english, 1995
2

A framework for security requirements

Year:
1991
Language:
english
File:
PDF, 900 KB
english, 1991
3

Useful Cybersecurity Metrics

Year:
2009
Language:
english
File:
PDF, 944 KB
english, 2009
4

Experimental design and analysis in software engineering

Year:
1995
Language:
english
File:
PDF, 1.91 MB
english, 1995
5

Principles of survey research

Year:
2002
Language:
english
File:
PDF, 431 KB
english, 2002
6

Design and analysis in software engineering

Year:
1994
Language:
english
File:
PDF, 389 KB
english, 1994
7

A methodology for penetration testing

Year:
1989
Language:
english
File:
PDF, 814 KB
english, 1989
8

Leveraging behavioral science to mitigate cyber security risk

Year:
2012
Language:
english
File:
PDF, 339 KB
english, 2012
9

Software Metrics: Progress after 25 Years?

Year:
2008
Language:
english
File:
PDF, 330 KB
english, 2008
10

Books

Year:
1998
Language:
english
File:
PDF, 1.03 MB
english, 1998
12

Anatomy of an Intrusion

Year:
2010
Language:
english
File:
PDF, 710 KB
english, 2010
14

Experimental design and analysis in software engineering, part 5

Year:
1995
Language:
english
File:
PDF, 418 KB
english, 1995
15

Executive mentoring

Year:
1995
Language:
english
File:
PDF, 3.98 MB
english, 1995
16

Software metrics in the process maturity framework

Year:
1990
Language:
english
File:
PDF, 703 KB
english, 1990
19

Risky business: what we have yet to learn about risk management

Year:
2000
Language:
english
File:
PDF, 142 KB
english, 2000
23

Using multiple metrics for analysis of improvement

Year:
1992
Language:
english
File:
PDF, 725 KB
english, 1992
25

Wavefront: a goal-driven requirements process model

Year:
1996
Language:
english
File:
PDF, 1.42 MB
english, 1996
26

Desert Island Column

Year:
1997
Language:
english
File:
PDF, 25 KB
english, 1997
27

Addressing the Insider Threat

Year:
2009
Language:
english
File:
PDF, 1.29 MB
english, 2009
28

Guest Editors' Introduction

Year:
2012
Language:
english
File:
PDF, 1.92 MB
english, 2012
29

A Key to the Castle

Year:
2012
Language:
english
File:
PDF, 643 KB
english, 2012
30

Books

Year:
1997
Language:
english
File:
PDF, 1.08 MB
english, 1997
31

Principles of survey research part 6

Year:
2003
Language:
english
File:
PDF, 252 KB
english, 2003
32

Principles of survey research

Year:
2002
Language:
english
File:
PDF, 475 KB
english, 2002
33

Principles of survey research

Year:
2001
Language:
english
File:
PDF, 331 KB
english, 2001
34

The Eyes Have It: Surveillance and How It Evolved

Year:
2014
Language:
english
File:
PDF, 1005 KB
english, 2014
35

Choosing a Security Option: The InfoSecure Methodology

Year:
2008
Language:
english
File:
PDF, 472 KB
english, 2008
36

Ramsey theory: Learning about the needle in the haystack

Year:
2013
Language:
english
File:
PDF, 119 KB
english, 2013
37

Insiders Behaving Badly

Year:
2008
Language:
english
File:
PDF, 151 KB
english, 2008
38

Security Measurement Steps, Missteps, and Next Steps

Year:
2012
Language:
english
File:
PDF, 224 KB
english, 2012
39

Principles of survey research part 4

Year:
2002
Language:
english
File:
PDF, 471 KB
english, 2002
40

Expanding to Meet Readers' Needs

Year:
2014
Language:
english
File:
PDF, 827 KB
english, 2014
42

Experimental design and analysis in software engineering

Year:
1995
Language:
english
File:
PDF, 513 KB
english, 1995
43

Experimental Design and Analysis in Software Engineering

Year:
1995
Language:
english
File:
PDF, 318 KB
english, 1995
44

Experimental design and analysis in software engineering, part 4

Year:
1995
Language:
english
File:
PDF, 311 KB
english, 1995
45

Principles of survey research part 2

Year:
2002
Language:
english
File:
PDF, 342 KB
english, 2002
49

Technology, Transparency, and Trust

Year:
2014
Language:
english
File:
PDF, 649 KB
english, 2014
50

Spider-Man, Hubris, and the Future of Security and Privacy

Year:
2015
Language:
english
File:
PDF, 648 KB
english, 2015