Misuse case

Results: 46



#Item
21Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:32:39
22Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:32:39
23Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:17:06
24Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:26:32
25Software development / Software project management / Computer network security / Software quality / Project management / Misuse case / Threat model / Software security assurance / Unified Modeling Language / Computing / Computer security / Business

Architecture and Design Considerations for Secure Software SoftwareAssurancePocket Guide Series: Development, VolumeV Version2.0, May 18, 2012

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-06-19 15:18:20
26Use case / Unified Modeling Language / Functional requirement / Unified Process / Object-oriented design / Scenario / Requirement / Reliability engineering / Misuse case / Software development / Software requirements / Software

Functional Requirements and Use Cases By Ruth Malan, Hewlett-Packard Company, and Dana Bredemeyer, Bredemeyer Consulting, Email: [removed] and [removed] Functional Requirements

Add to Reading List

Source URL: www.digilife.be

Language: English
27Structure / Non-governmental organization / Philanthropy / Political science

Case 7 This anonymous complaint was about the suspected misuse of subventions by a subvented NGO: (i) Some staff members of a subvented service unit of the NGO were arranged to

Add to Reading List

Source URL: www.swd.gov.hk

Language: English - Date: 2012-12-27 21:27:43
28Software project management / Business process / Management / Systems Modeling Language / Unified Modeling Language / Use case / Misuse case / Software development / Business / Software requirements

The «include» and «extend» Relationships in Use Case Models Introduction UML defines three stereotypes of association between Use Cases, «include», «extend» and generalisation. For the most part, the popular text

Add to Reading List

Source URL: www.karonaconsulting.com

Language: English - Date: 2014-10-15 10:50:29
29Computer network security / Security / Software requirements / Software project management / Data security / Misuse case / Threat model / Use case / Threat / Software development / Computer security / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Defining Misuse within the Development Process

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:28
30Computer security / Hacking / Software testing / Password / Misuse case / Proprietary software / HTTP cookie / Man-in-the-middle attack / Vulnerability / Software / Computing / Computer network security

Software Design Misuse and Abuse Cases Getting Past the Positive Paco Hope Gary McGraw, Ph.D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
UPDATE