Software Development Security

Results: 957



#Item
451Software testing / Extreme programming / Agile software development / DevOps / Information technology management / Rackspace / OWASP / Test-driven development / Continuous integration / Software development / Software / Software development process

DevOps, CI, APIs, Oh My! Security Gone Agile Matt Tesauro, SANS AppSec 2014 – Austin, TX, February 2014

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2014-02-12 17:26:20
452Science / Computer security / Quality assurance / Software assurance / Application security / OWASP / Software security assurance / Copyright / Software development process / Software quality / Security / Public safety

Do You Have a Scanner! Or Do You Have a Scanning Program?! ! Dan Cornell! @danielcornell

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
453Computer architecture / Android / IOS / Mach / Multi-touch / App Store / Rooting / Mobile application development / Software / Computing / Smartphones

Mobile Security 2013 Phenomenal Cosmic Power, Itty Bitty Living Space Software Confidence. Achieved.

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
454United States Department of Homeland Security / Carnegie Mellon University / Software Engineering Institute / Idaho National Laboratory / Critical infrastructure protection / Computer security / Smart grid / Office of Electricity Delivery and Energy Reliability / Capability Maturity Model / National security / Security / Software development

Department of Homeland Security (2955)

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2012-06-01 12:20:00
455OWASP / Security / Software project management / Management / Project management / Agile Unified Process / Extreme programming / Software development process / Dynamic systems development method / Software development / Agile software development / Software

Microsoft PowerPoint - AppSec2006Seattle-AgileAndSecure.ppt [Read-Only]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:33
456Knowledge / Project management / Decision theory / Risk management / Security / Risk / Decision making / Uncertainty / Software development process / Science / Management / Actuarial science

Strategic Decision Making   ________________________________________________________________________ “I was impressed with the planning, the facilities and the instruction.  I look forward to additio

Add to Reading List

Source URL: www.mccombs.utexas.edu

Language: English - Date: 2010-11-15 15:09:59
457Technology / Android / Information appliances / Embedded Linux / Data synchronization / Rooting / Personal digital assistant / Mobile application development / Mobile device management / Computing / Software / Smartphones

Making the Google Android™ Operating System “Enterprise-Ready” How Honeywell Scanning & Mobility Solves the Security Challenges Honeywell Scanning & Mobility Mika Majapuro, Manager - Product Marketing and Daniel Ye

Add to Reading List

Source URL: www.honeywellaidc.com

Language: English - Date: 2013-02-18 17:00:38
458Risk / Software testing / Rapid7 / Carnegie Mellon University / Social vulnerability / Vulnerability / Information security / Carnegie Mellon Silicon Valley / Software / Computer security / System software

Vulnerability Management Case Study Rapid7 Nexpose Meets Carnegie Mellon University’s Requirements for Vulnerability Management, Co-Development and Higher Education Expertise Broadening Protection to Ensure Campus-Wid

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:55
459Dependability / Safety / Safety engineering / Software engineering / Risk / Computing / Management / Security / Formal methods / Quality

Assurance Based Development of Critical Systems

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-10-03 11:21:29
460Cyberwarfare / Software testing / Crime prevention / National security / Agile software development / Application security / Penetration test / Vulnerability / Software development process / Computer network security / Security / Computer security

Microsoft Word - ibm-8566-How_security_well_suited_for_Agile_development.doc

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2011-10-11 09:26:37
UPDATE