نتایج جستجو برای: assurance region
تعداد نتایج: 557777 فیلتر نتایج به سال:
With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven...
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During this period three main efforts have proceeded in pa...
Assurance in the security of rapidly evolving enterprises depends on a complex set of evidence. This paper describes a method for structuring this body of evidence into a manageable framework called an “assurance argument.” The method is extremely flexible, and is capable of including all relevant claims and evidence. The structure allows the practitioner to compare the costs and benefits of di...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
iv 1 Background and Assumptions 1 1.1 The Importance and Challenges of Software Assurance Measurement 1 1.2 Why Security Is a Concern 1 1.3 Purpose of This Report 3 1.4 Intended Audience 3 1.5 Scope 4 1.6 Constraints 5 2 Definition of Terms 6 2.1 What Is Software Assurance? 6 2.2 What Is Software Assurance Measurement? 6 2.3 Measurement Domains 7 2.4 Critical Programming Errors 8 3 Measurement ...
The current study investigates the water quality parameters of drinking resources in District Neelam (DNLM), Azad Jammu & Kashmir (AJK), Northwestern Pakistan. studied area has been recently reported with many waterborne diseases, which probed this analytical study. samples were aseptically collected from springs, taps, and surface bodies. parameters, such as physical, microbiological, anio...
Federated Identity Management is an emerging paradigm that is rightly getting a lot of standardization and research attention. One aspect that is not receiving enough attention is assurance. Given the challenges enterprises faced trying to demonstrate appropriate control of their internal and monolithic identity management systems, the problem of how to provide assurance to multiple stakeholder...
he structure and organization of the Performance Assurance Program developed for the Midcourse Space Experiment (MSX) spacecraft are discussed. Included is an overview of the engineering disciplines of the program: reliability, quality assurance, and system safety. The performance assurance role in each of the four MSX development phases is explained, followed by a review of MSX integration and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید