Reliant

Results: 426



#Item
221Software / Quality / Standards / Carnegie Mellon University / Capability Maturity Model Integration / Information Services Procurement Library / Mergers and acquisitions / Government procurement in the United States / Systems engineering process / Software development / Management / Software development process

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Acquisition Anonymous Paul Kimmerly, Double Play Process Diagnostics, Inc. Abstract. Everyone is familiar with the idea of acquisition. Acquisition is something

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
222Software quality / Software testing / Computer network security / National security / Software security assurance / Vulnerability / Threat model / Penetration test / Information security / Computer security / Security / Cyberwarfare

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Using Concept Maps to Introduce Software Security Assurance Cases

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:33
223Software testing / Computer network security / Advanced Encryption Standard / Electronic commerce / Application security / Vulnerability / Communications protocol / Software quality / Penetration test / Computing / Cyberwarfare / Computer security

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES N-Version Architectural Framework for Application Security Automation (NVASA)

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
224United States / Reliant / Vermont / Mergers and acquisitions

STATE OF VERMONT PUBLIC SERVICE BOARD Docket No[removed]Petition of Reliant Communications, Inc., for Approval of a Transfer of Control

Add to Reading List

Source URL: www.state.vt.us

Language: English - Date: 2006-02-22 12:00:24
225Software / Software engineering / Agile software development / Software project management / Agile management / Scrum / Waterfall model / Software development process / Systems development life-cycle / Software development / Project management / Technology

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Agile Surveillance Points: An Alternative to Milestone Reviews Dick Carlson, Agile & Lean Education Associates (ALEA)

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
226Software quality / Software engineering / Formal methods / Software development process / Carnegie Mellon University / Software assurance / Software Engineering Institute / Software quality assurance / ISO/IEC 12207 / Software development / Quality assurance / Evaluation

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
227Evaluation / Control chart / Shewhart individuals control chart / Walter A. Shewhart / Six Sigma / Software quality / Statistical process control / W. Edwards Deming / Nelson rules / Quality / Management / Statistics

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Using Control Charts to Detect Signals Forecasting from

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
228Computer security / Emergency Alert System / Civil defense / Electronic commerce / Common Alerting Protocol / Integrated Public Alert and Warning System / Vulnerability / Software Engineering Institute / Alert messaging / Cyberwarfare / Public safety / Computer network security

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Evaluating Security Risks Using Mission Threads Carol Woody, Ph.D., SEI

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:33
229Cyberwarfare / Software quality / Data security / National security / Software assurance / Software Engineering Institute / Software development process / Vulnerability / Software security assurance / Computer network security / Security / Computer security

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Software Assurance, Trustworthiness, and Rigor

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
230Landscape ecology / Ecological succession / Ecological restoration / Conservation biology / Conservation reliant species / Habitat fragmentation / Wildlife / New England Cottontail / Edge effect / Biology / Environment / Ecology

Chapter 2. Looking Beyond Property Boundaries – Landscape and Regional Considerations for Managing Early-Successional Habitats John A. Litvaitis, Department of Natural Resources University of New Hampshire, Durham, NH

Add to Reading List

Source URL: www.dnrec.delaware.gov

Language: English - Date: 2011-06-21 13:38:53
UPDATE