Software Development Security

Results: 957



#Item
461Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:58:14
462Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:57:38
463Information technology management / Computer security / Agile software development / Software project management / DevOps / Software development process / Release management / Application security / Open-source software / Software development / Software / Computing

EXECUTIVE BRIEF We Make It Easy to Build Trusted Software— and Keep It That Way Over Time

Add to Reading List

Source URL: www.sonatype.com

Language: English
464HTML5 / Mobile application development / Python / Software development / Cloud computing / Application software / Ext JS / Mobile device management / Provisioning / Computing / Ajax / Software

Sencha Space Manage the lifecycle, deployment, and security of your enterprise HTML5 applications for any user on any device

Add to Reading List

Source URL: cdn.sencha.io

Language: English - Date: 2014-10-27 18:24:52
465Km / Joint Interoperability Test Command / Project management office / Reliability engineering / National Security Agency / Computer security / Provisioning / Software development process / Software testing / Security / Science / National security

Microsoft PowerPoint[removed]KMIClientNodePicture-r2-raw.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-01-08 17:11:14
466Software development process / Cloud infrastructure / Software testing / Agile software development / Rackspace / Web hosting / DevOps / OpenStack / OWASP / Cloud computing / Software development / Computing

Testing at Cloud Speed Matt Tesauro, SANS AppSec 2013 – Austin, TX, April 2013 2

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
467Risk management / Security / Risk analysis / Actuarial science / Privacy / Information security / ISO 31000 / Project management / Software development process / Ethics / Management / Risk

Privacy Impact Assessment executive summary

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-12-11 07:08:17
468Computer architecture / Android / IOS / Mach / Multi-touch / App Store / Rooting / Mobile application development / Software / Computing / Smartphones

Mobile Security 2013 Phenomenal Cosmic Power, Itty Bitty Living Space Software Confidence. Achieved.

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
469Software development process / Galbreath / Agile software development / DevOps / Information technology management

What You Can Learn From Small Companies About AppSec SANS AppSec Las Vegas 2012 Nick Galbreath @ngalbreath [removed]

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
470Science / Computer security / Quality assurance / Software assurance / Application security / OWASP / Software security assurance / Copyright / Software development process / Software quality / Security / Public safety

Do You Have a Scanner! Or Do You Have a Scanning Program?! ! Dan Cornell! @danielcornell

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
UPDATE