Isolated user spaces known as containers have become a popular standard for packaging and distributing software applications at the tactical edge. However, devices in this environment have limited ...
Although the term software architecture is used frequently in today's software industry, its meaning is not universally understood. In this course we answer these questions What is software ...
Linda Northrop has more than 45 years of experience in the software development field as a practitioner, researcher, manager, consultant, and educator. She retired from full-time employment at the ...
This three day course builds upon the initial concepts presented in the prerequisite courses Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program. The course ...
This three-day, instructor-led course develops the skills and competencies needed to assess an organization's insider threat prevention, detection, and response capabilities; evaluate the ...
Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ ...
Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in Java programming.