Fortify Software

Results: 33



#Item
1Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
21 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
3Comprehensively Protect Your Mobile Applications with HP Fortify and Arxan Protecting Mobile, Embedded, and Packaged Software from Attacks As your applications are running in distributed or untrusted environments, they a

Comprehensively Protect Your Mobile Applications with HP Fortify and Arxan Protecting Mobile, Embedded, and Packaged Software from Attacks As your applications are running in distributed or untrusted environments, they a

Add to Reading List

Source URL: www.arxan.co.jp

Language: English - Date: 2015-08-25 01:35:01
    4

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:25
    5Iron Chef Black Hat Brian Chess, Jacob West Sean Fay, Toshinari Kureha {brian, jacob, sean, tkureha}@fortify.com August 2, 2007 Iron Chef Black Hat is a competition between two tool-building titans: Sean Fay and Toshi Ku

    Iron Chef Black Hat Brian Chess, Jacob West Sean Fay, Toshinari Kureha {brian, jacob, sean, tkureha}@fortify.com August 2, 2007 Iron Chef Black Hat is a competition between two tool-building titans: Sean Fay and Toshi Ku

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    6Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess / Jacob West Fortify Software

    Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess / Jacob West Fortify Software

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:23
    7Encapsulation Hataları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET –Encapsulation (https://www.fortify.com/vulncat/en/vulncat/dotnet/Encap.html) Semih Gelişli, sgelisli-at-gmail-dot-com, 26 Eylü

    Encapsulation Hataları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET –Encapsulation (https://www.fortify.com/vulncat/en/vulncat/dotnet/Encap.html) Semih Gelişli, sgelisli-at-gmail-dot-com, 26 Eylü

    Add to Reading List

    Source URL: www.webguvenligi.org

    Language: Turkish - Date: 2011-10-13 07:08:58
      8Uygulama Programlama Arayüzü(API) İstismarları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET – API Abuse (https://www.fortify.com/vulncat/en/vulncat/dotnet/APIA.html) Semih Gelişli, sgelisli-at-

      Uygulama Programlama Arayüzü(API) İstismarları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET – API Abuse (https://www.fortify.com/vulncat/en/vulncat/dotnet/APIA.html) Semih Gelişli, sgelisli-at-

      Add to Reading List

      Source URL: www.webguvenligi.org

      Language: Turkish - Date: 2011-08-22 17:44:46
        9White paper  HP 2012 Cyber Risk Report

        White paper HP 2012 Cyber Risk Report

        Add to Reading List

        Source URL: www.hpenterprisesecurity.com

        Language: English - Date: 2013-02-25 11:05:35
        10Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract

        Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract

        Add to Reading List

        Source URL: pages.cs.wisc.edu

        Language: English - Date: 2009-06-01 10:19:43