Security assurance

Results: 2582



#Item
291Software quality / Hacking / Software testing / Vulnerability / C / Proprietary software / Software assurance / Requirement / Debian build toolchain / Computing / Software development / Software engineering

Reference tables from Section 2b of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:16
292Software quality / Computer security / Software development process / Software engineering / Application security / Software assurance / Vulnerability / Lean software development / Agile Modeling / Software development / Software project management / Agile software development

Microsoft Word - Agile_Press_Release_FINAL.doc

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 15:56:13
293Law / Security / Information sensitivity / Labour law / Non-disclosure agreement / Confidentiality / Trade secret / Duty of confidentiality / Intellectual property law / Ethics / Secrecy

SAFECODE MEMBER CONFIDENTIALITY AND NON-DISCLOSURE AGREEMENT This Agreement is entered into among the following parties: Software Assurance Forum for Excellence in Code (―SAFECode‖) and each member of SAFECode that h

Add to Reading List

Source URL: safecode.org

Language: English - Date: 2014-08-15 16:06:42
294Ethics / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Validation / Evaluation / Computer security / Thought

Trust Technology Assessment Program Common Criteria Certificate

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
295Nuclear strategies / Cold War / NATO / Nuclear Non-Proliferation Treaty / Nuclear sharing / Nuclear proliferation / Nuclear program of Iran / Nuclear umbrella / Security assurance / International relations / Nuclear weapons / Nuclear warfare

Image: US Federal Government Conference report Deterrence, assurance and reductions: rebalancing the nuclear order Wednesday 20 – Saturday 23 June 2012 | WP1175

Add to Reading List

Source URL: www.wiltonpark.org.uk

Language: English - Date: 2013-04-03 10:49:04
296National security / Computing / Quality assurance / Software assurance / Email / Computer security / Science / Software development process / Security / Software quality / Crime prevention

ASSOCIATE MEMBERSHIP APPLICATION

Add to Reading List

Source URL: safecode.org

Language: English - Date: 2014-08-15 16:06:18
297Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Global Information Assurance Certification / Consensus audit guidelines / Threat / Computer security / Computer network security / Cyberwarfare

DOC Document

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-03-02 09:54:06
298Computer network security / Computer security / Cyberwarfare / Software quality / Cross-site scripting / Penetration test / Security engineering / Cryptography / Software assurance / Security / Crime prevention / National security

Media Contact: Stacy Simpson SAFECodeFOR IMMEDIATE RELEASE

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 15:56:27
299Computing / Common Criteria / Operating system / Validation / Hard disk drive / Protection Profile / Access control / FIPS 140-2 / Evaluation Assurance Level / Security / Evaluation / Computer security

Secure Systems Limited Silicon Data Vault Validation Report, VersionOctober 2005 National Information Assurance Partnership ®

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
300Linguistics / Machine translation / Steganography / Computer-assisted translation / Digital watermarking / Parallel text / Watermark / Translation / Steganalysis / Cryptography / Espionage / Watermarking

CERIAS Tech ReportTRANSLATION-BASED STEGANOGRAPHY by C. Grothoff and K. Grothoff and L. Alkhutova and R. Stutsman and M. Atallah Center for Education and Research in Information Assurance and Security, Purdue Un

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2005-06-07 11:33:08
UPDATE