Cigital

Results: 66



#Item
31Java platform / Eclipse / Debuggers / IBM software / Plug-in / Software / Computing / Python

Cigital SecureAssist™ Eclipse Plug-in v2.3 User’s Guide Proprietary Statement

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2014-10-21 09:48:21
32Computer network security / Software testing / Software bugs / Crime prevention / National security / Vulnerability / Buffer overflow / Common Criteria / Malware / Computer security / Cyberwarfare / Security

Building Secure Software A Difficult But Critical Step in Protecting Your Business Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
33Video game genres / Software / Digital media / Gaming / Gary McGraw / software security / Greg Hoglund / Cheating in video games / Massively multiplayer online role-playing game / Virtual economy / Competitive video gaming / Social software

Guest Editors’ Introduction Securing Online Games Safeguarding the Future of Software Security

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
34Technology / Cyberwarfare / Computing / Data security / Wireless security / Wi-Fi / Information security / Wireless LAN / Wireless / Computer network security / Computer security / Wireless networking

2001 Filing Information October 2001 IDC # Volume: 1

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
35Software testing / Computer network security / Crime prevention / National security / Vulnerability / Software quality / Software development process / Security testing / Reliability engineering / Security / Computer security / Cyberwarfare

S OFTWARE R ISK M ANAGEMENT FOR S ECURITY G ARY M C G RAW P H .D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
36Computer network security / Software testing / Software review / National security / Fortify Software / Application security / Penetration test / Gary McGraw / Cigital / Security / Computing / Computer security

INSIGHTS: CODE REVIEW Technology Transfer: Computer Security

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:28
37Cyberwarfare / Computer network security / Application security / Security / Vulnerability / Penetration test / Code review / Static program analysis / Test automation / Computer security / Software testing / Computing

Building Security In Editors: John Steven, [removed] Gunnar Peterson, [removed] Deborah A. Frincke, [removed] State of Application

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
38Cyberwarfare / Computing / Crime prevention / National security / Vulnerability / Penetration test / Application security / Software development process / Software engineering / Security / Computer security / Software testing

Software Security Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
39Security / Passphrase / Chosen-plaintext attack / Chosen-ciphertext attack / Crypt / Ciphertext / Key / Secure Shell / Known-plaintext attack / Cryptography / Espionage / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:33
40Computer network security / Security / Software requirements / Software project management / Data security / Misuse case / Threat model / Use case / Threat / Software development / Computer security / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Defining Misuse within the Development Process

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:28
UPDATE