Software Development Security

Results: 957



#Item
421Public safety / Cyberwarfare / Computer security / Computer network security / Security / OWASP

The Need for Confluence The Essential Role of Incident Response in Secure Software Development OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:25
422Software development process / Computing / Security / United States / Internet censorship / Internet / Stop Online Piracy Act / Information security / Agile software development / DevOps / Information technology management

Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed… Joshua Corman & Gene Kim AppSecDC

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:55:31
423System software / Computer network security / Methodology / Software development process / Software engineering / Spyware / Proprietary software / Free software / Sunbelt Software / Espionage / Software / Software licenses

The Sunbelt Software Review Process

Add to Reading List

Source URL: www.sunbeltsecurity.com

Language: English - Date: 2010-03-19 10:56:29
424Computer network security / Crime prevention / National security / Data security / Vulnerability / Software assurance / Application security / Software quality / Software development process / Security / Cyberwarfare / Computer security

Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
425Crime prevention / National security / Computer security / Software assurance / Software development process / Application security / Software bug / Capability Maturity Model Integration / Requirement / Software development / Software quality / Computer network security

What can an Acquirer do to prevent developers from make dangerous software errors? OWASP AppSec DC 2012 April 5, 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:59:35
426Security / OWASP / Software testing / Data security / Vulnerability / Threat / Information security management system / Penetration test / Application security / Computer security / Cyberwarfare / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Development  Organizations        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:26:03
427Software licenses / Computer law / Open-source software / Software bug / Vulnerability / Computer security / Open source software development / Software development process / Debian / Computing / Software / Security

Open Source in Security: Visiting the Bizarre∗ Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York[removed]removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:00:46
428Cyberwarfare / Software engineering / Software licenses / Source code / Application security / Computer security / Vulnerability / Software development process / Proprietary software / Computing / Software testing / Computer network security

Microsoft Word - CIGITAL_WPC4_TEMPLATE.DOC

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
429Security / Data security / OWASP / Software testing / Application security / Web application security / Vulnerability management / Vulnerability / Threat model / Computer security / Computer network security / Cyberwarfare

-[removed] The OWASP Application Security Code of Conduct for Development Organizations

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:21:14
430Compiling tools / TeamCity / JetBrains / Integrated development environments / Fluxys / NDepend / Microsoft Visual Studio / Software / Computing / Continuous integration

Success Story www.jetbrains.com As an infrastructure company operating on the North-Western European natural gas market, Fluxys wishes to contribute to security of supply and the functioning of the market in that region

Add to Reading List

Source URL: www.jetbrains.com

Language: English - Date: 2013-01-24 10:09:08
UPDATE