U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

M

project and mid-level managers

Title Updated datesort ascending
Evidence of Assurance: Laying the Foundation for a Credible Security Case 2014-11-04
Arguing Security - Creating Security Assurance Cases 2014-11-04
Training and Awareness 2013-08-07
Strengthening Ties Between Process and Security 2013-07-31
Secure Software Development Life Cycle Processes 2013-07-31
Black Box Security Testing Tools 2013-07-31
Estimating Benefits from Investing in Secure Software Development 2013-07-31
White Box Testing 2013-07-05
Risk-Based and Functional Security Testing 2013-07-05
Risk Management Framework (RMF) 2013-07-05
SQUARE Process 2013-07-05
Introduction to the CLASP Process 2013-07-03
Incident Management 2013-07-02
Risk-Centered Practices 2013-07-02
"Prioritizing IT Controls for Effective, Measurable Security" 2013-07-02
"Plan, Do, Check, Act" 2013-07-02
Navigating the Security Practice Landscape 2013-07-02
Identity in Assembly and Integration 2013-07-02
"Security Concepts, Challenges, and Design Considerations for Web Services Integration" 2013-07-02
Architectural Risk Analysis 2013-07-02
Maturity of Practice 2013-05-23
How Much Security Is Enough? 2013-05-21
Business Case 2013-05-21
Adapting Penetration Testing for Software Development Purposes 2013-05-21
Integrating Security and IT 2013-05-21
Making the Business Case for Software Assurance 2013-05-21
Models for Assessing the Cost and Value of Software Assurance 2013-05-21
Software Assurance Education Overview 2013-05-15
Assurance Cases Overview 2013-05-14
Correctness by Construction 2013-05-14
Attack Pattern Usage 2013-05-14
A Common Sense Way to Make the Business Case for Software Assurance 2013-05-14
Attack Pattern Generation 2013-05-14
Deploying and Operating Secure Systems 2013-05-14
"Assembly, Integration, and Evolution Overview" 2013-05-14
Introduction to Attack Patterns 2013-05-14
Framing Security as a Governance and Management Concern: Risks and Opportunities 2013-05-14
Security Is Not Just a Technical Issue 2013-05-13
Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets 2013-05-13
Security Requirements Engineering 2010-07-14
Code Analysis 2008-11-03
Application Firewalls and Proxies - Introduction and Concept of Operations 2008-09-27
The Role of Computer Security Incident Response Teams in the Software Development Life Cycle 2008-08-20
Defining Computer Security Incident Response Teams 2007-01-24
Penetration Testing Tools 2007-01-18
Source Code Analysis Tools - Business Case 2005-09-28
Trustworthy Composition: The System Is Not Always the Sum of Its Parts 2005-09-28
Back to Top