Software Development Security

Results: 957



#Item
471Android / Computing / Free software / Cloud clients / Malware / Motorola Droid / Rooting / Android software development / Smartphones / Software / Embedded Linux

Android Platform Realities  What makes the malware to rise high? ─ Android provenance system ● Application masquerading (repackaging) is easy ─ Permissions are user centric

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
472Software testing / Hacking / Computer network security / Risk / Vulnerability / Software development methodology / Security / Computer security / Cyberwarfare

Scheme note 11 - Methodology for AVA_VAN 4 and 5

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-02-13 03:53:05
473Software testing / Extreme programming / Agile software development / DevOps / Information technology management / Rackspace / OWASP / Test-driven development / Continuous integration / Software development / Software / Software development process

DevOps, CI, APIs, Oh My! Security Gone Agile Matt Tesauro, SANS AppSec 2014 – Austin, TX, February 2014

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2014-02-12 17:26:20
474Computer security / Trapster / Mobile application development / Malware / Computing / Software engineering / Application security

Mobile Security Application Challenges SANS AppSec 2011

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
475Bioethics / Actuarial science / Security / Risk assessment / Risk management / Biorisk / Biosafety / Biocontainment / Software development process / Risk / Ethics / Management

DEVELOPING A BIOSAFETY RISK ASSESSMENT METHODOLOGY (Biosafety-RAM) Joe Kozlovac Agency Biological Safety Officer USDA ARS National Programs

Add to Reading List

Source URL: www.absaconference.org

Language: English - Date: 2009-07-22 12:24:29
476Antivirus software / Computer network security / Malware / Rogue software / Spyware / System software / Cyberwarfare / Software

FOR IMMEDIATE RELEASE Contact: Julia Maglione, [removed], [removed] SWWDC Seeking Proposals for IT Support Services Vancouver, Wash. (Mar. 11, 2014) – The Southwest Washington Workforce Development Council

Add to Reading List

Source URL: www.swwdc.org

Language: English - Date: 2014-04-22 10:23:32
477Agile software development / DevOps / Information technology management / Software development process / Software distribution / VMware / Vyatta / MongoDB / Xen / Software / Computing / Cloud computing

Site Reliability Engineer KAIROS KEYWORDS Saas, cloud, devops, linux, networking, database, infrastructure, security, automation. JOB DESCRIPTION Kairos is looking for an experienced Site Reliability engineer to join a r

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-11-04 16:31:07
478Distributed revision control systems / Perforce / Git / Repo / Patent infringement / Patent attorney / Patent / Comparison of revision control software / Software / Computer programming / Computing

IP Security: Covering Your Bases in a Global Development Environment Governance. Auditing. Patent lawsuit. These all sound scary - and if you have any

Add to Reading List

Source URL: www.perforce.com

Language: English - Date: 2013-02-01 17:00:49
479Graphics file formats / Animation software / Web development software / Vulnerability / Adobe Systems / Exploit / Cross-site scripting / Cross-site request forgery / Software / Cross-platform software / Adobe Flash

State of Alaska Cyber Security & Critical Infrastructure Cyber Advisory November 26, 2014 The following cyber advisory was issued by the State of Alaska and was intended for State government entities. The information may

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-11-26 18:19:55
480Adobe Flash / Animation software / Web development software / Vulnerability / Adobe AIR / Adobe Systems / Rich Internet application / Firefox / Pwnie Awards / Software / Cross-platform software / Software testing

State of Alaska Cyber Security & Critical Infrastructure Cyber Advisory January 13, 2015 The following cyber advisory was issued by the State of Alaska and was intended for State government entities. The information may

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2015-01-14 13:52:19
UPDATE