Security testing

Results: 3214



#Item
981Software engineering / Software project management / Software development process / Software testing / Application security / Extreme programming / Penetration test / User story / Systems development life-cycle / Software development / Software / Agile software development

Agile development for Application security managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security into the proc

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-06 18:09:12
982Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
983Software engineering / Software project management / Software development process / Software testing / Application security / Extreme programming / Penetration test / User story / Systems development life-cycle / Software development / Software / Agile software development

Agile Development for Application Security Managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security into the proc

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-06 18:09:12
984Software testing / Cloud computing / Software / Application firewall / Application security / Software as a service / Penetration test / Computing / Computer security / Computer network security

Press Release Paris, February 16, 2012 Deny All strengthens its leadership in the global application security market In 2011, Deny All shipped major new versions of its products and successfully deployed them

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 04:56:01
985Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
986Software testing / Vulnerability / Microsoft Visual Studio / Computing / Software / Computer security / Hacking

Getting Started with SecureAssist June 2014 SecureAssist is an IDE plugin that points out common security vulnerabilities in real time as you’re coding. When you open a file, it quickly runs in the background and popul

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2014-07-14 16:54:22
987Software testing / Vulnerability / Computer security / Social vulnerability / Heat wave / Risk / Ethics / Management

Risk, Marginality, and Urban Space: The Role of the Built Environment in the 2003 Paris Heat Wave Richard Keller Department of Medical History and Bioethics University of Wisconsin - Madison The devastating heat wave of

Add to Reading List

Source URL: ccr.aos.wisc.edu

Language: English - Date: 2015-01-26 11:57:21
988Computer security / Software testing / Penetration test / Application firewall / Vulnerability / Software as a service / Attack / XML / Computing / Cyberwarfare / Computer network security

Microsoft Word[removed]CP- Edge-EN.doc

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 05:31:39
989Source code / Software testing / C programming language / MISRA C / Coding conventions / Vulnerability / Motor Industry Software Reliability Association / Secure coding / Computer security / Computing / Software engineering / Computer programming

Product Overview Software Technology LDRArules™ Increases Visibility for Software Standards Compliance and Security Vulnerabilities

Add to Reading List

Source URL: www.ldra.com

Language: English - Date: 2015-03-26 09:28:15
990Computer network security / Risk / Hacking / Software testing / Vulnerability scanner / Vulnerability / Image scanner / Port scanner / Cross-site scripting / Computer security / Cyberwarfare / System software

AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 © The Government of the Hong Kong Special Administrative Region

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:19
UPDATE