Software Development Security

Results: 957



#Item
401Risk / Actuarial science / Risk management / Security / European Physiology Modules / Software development process / Business / Empresas Públicas de Medellín / Enterprise performance management / Management / Science / Project management

ePM Launches Organization Readiness Assessment

Add to Reading List

Source URL: epm.cc

Language: English - Date: 2014-11-04 13:46:43
402Project management / Method engineering / COBIT / Information technology audit / Privacy / Corporate governance of information technology / Information security management system / Capability Maturity Model / Information Technology Infrastructure Library / Information technology management / Software development / Information technology governance

MODEL-BASED IT GOVERNANCE MATURITY ASSESSMENTS WITH COBIT Simonsson, Mårten, Department of Industrial Information and Control Systems, KTH, Royal Institute of Technology, Osquldas väg 12, 10044, Stockholm, Sweden, ms10

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2007-05-14 14:08:40
403Java enterprise platform / Middleware / Oracle Fusion Middleware / Oracle Corporation / Oracle SOA Suite / Oracle Database / Oracle WebCenter / Oracle Application Development Framework / Oracle Application Server / Software / Computing / Business software

Oracle Fusion Middleware Security Overview

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2014-10-26 10:31:32
404Computer security / Time / Hot stamping / Metal forming / Simulation software / Stamping

TrustWeaver AB DEVELOPMENT Time-Stamping Policy 1. Identification This DEVELOPMENT Time-Stamping Policy was issued by TrustWeaver AB under the unique identifier[removed][removed]For development and test only! Tr

Add to Reading List

Source URL: www.trustweaver.com

Language: English - Date: 2015-02-09 04:16:05
405Security / Systems engineering / Software requirements / Design for X / Fault injection / Safety engineering / DO-178B / Requirement / Fault-tolerant design / Reliability engineering / Safety / Software development

Noname manuscript No. (will be inserted by the editor) Deriving Fault-Detection Mechanisms from Safety Requirements Dominik Sojer · Christian Buckl · Alois Knoll

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2013-05-15 08:23:50
406Design / Computer security / User interface / Virtual reality / Usability / Trusted path / Principle of least privilege / User / End-user development / Computing / Human–computer interaction / Software

User Interaction Design for Secure Systems Ka-Ping Yee Report No. UCB/CSD[removed]May 2002

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2002-05-31 13:32:33
407Software testing / Computer network security / Crime prevention / National security / Vulnerability / Software quality / Software development process / Security testing / Reliability engineering / Security / Computer security / Cyberwarfare

S OFTWARE R ISK M ANAGEMENT FOR S ECURITY G ARY M C G RAW P H .D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
408Cyberwarfare / Computing / Crime prevention / National security / Vulnerability / Penetration test / Application security / Software development process / Software engineering / Security / Computer security / Software testing

Software Security Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
409Computer law / Cross-platform software / Open-source software / Proprietary software / Open source software development / Open source / Source code / Debian / Free software / Software licenses / Software / Computing

- 15 - Appeared in: Computers & Security[removed]471 The Open Source Approach – Opportunities and Limitations

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2002-09-20 07:46:17
410Computer network security / Security / Software requirements / Software project management / Data security / Misuse case / Threat model / Use case / Threat / Software development / Computer security / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Defining Misuse within the Development Process

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:28
UPDATE