Cigital

Results: 66



#Item
41Windows games / Games / Linux games / Social software / Video game genres / Massively multiplayer online role-playing game / World of Warcraft / Massively multiplayer online game / Multiplayer online game / Virtual economy / Software / Digital media

Attack Trends Editors: David Ahmad, [removed] Iván Arce, [removed] Online Games and Security

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
42Business / Formal methods / Software project management / Project management / Software testing / Software development process / Quality assurance / IBM Rational Unified Process / Reliability engineering / Software quality / Software development / Management

S OFTWARE R ISK M ANAGEMENT T HE I MPORTANCE INTO THE

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
43National security / Security / Computer crimes / Electronic warfare / Military technology / United States Cyber Command / Cyber spying / Stuxnet / Operation Aurora / Cybercrime / Cyberwarfare / Hacking

CHAPTER III: SEPARATING THREAT FROM THE HYPE: WHAT WASHINGTON NEEDS TO KNOW ABOUT CYBER SECURITY By Gary McGraw and Nathaniel Fick

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:30
44Computer network security / Software testing / Data security / Software development process / Vulnerability / Software engineering / Penetration test / Information security management system / Computer standard / Security / Computer security / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Essential Factors for Successful Software

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
45Smart grid / Electric power transmission systems / Emerging technologies / MultiSpeak / Smart meter / Cigital / Meter Data Management / Demand response / SAIC / Electric power / Energy / Technology

Microsoft Word - FINAL3-Abridged synopsis.doc

Add to Reading List

Source URL: www.ferc.gov

Language: English - Date: 2009-11-19 12:18:02
46Computer network security / Crime prevention / National security / Data security / Vulnerability / Software assurance / Application security / Software quality / Software development process / Security / Cyberwarfare / Computer security

Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
47Public safety / Crime prevention / Video / Computer network security / Cross-site scripting / Closed-circuit television / Cross-site request forgery / IP camera / IP address / Security / National security / Surveillance

ID THEFTS Design Flaws in IP Surveillance Cameras Exploiting Web Interfaces IP surveillance cameras are used extensively for monitoring of live

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:32
48Computer network security / Two-factor authentication / Password manager / Security token / Password / One-time password / SecurID / Authentication / Self-service password reset / Security / Computer security / Access control

User Authentication on Mobile Devices Amit Sethi Technical Manager Omair Manzoor Senior Security Consultant

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:56
49Mathematics / Hardware random number generator / Randomized algorithm / Pseudorandomness / Random number generation / Pseudorandom number generator / Entropy / Random permutation / Cryptographically secure pseudorandom number generator / Randomness / Cryptography / Applied mathematics

The Importance of Reliable Randomness A Note on Random Number Generation and Combinatorial Sampling Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
50Computer security / Hacking / Software testing / Password / Misuse case / Proprietary software / HTTP cookie / Man-in-the-middle attack / Vulnerability / Software / Computing / Computer network security

Software Design Misuse and Abuse Cases Getting Past the Positive Paco Hope Gary McGraw, Ph.D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
UPDATE