Software Development Security

Results: 957



#Item
481Software development / Information technology audit / COBIT / Privacy / Standards / Corporate governance of information technology / Information security management system / Information Criteria / Capability Maturity Model / Information technology management / Information technology governance / Project management

Microsoft Word - asist124-camera.docx

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:54:36
482Office equipment / Mathematics / Technology / Housing / Federal assistance in the United States / Software calculator / Community Development Block Grant / Social Security / HOME Investment Partnerships Program / Affordable housing / United States Department of Housing and Urban Development / Calculators

CPD Income Eligibility Calculator User Manual

Add to Reading List

Source URL: www.hudexchange.info

Language: English - Date: 2014-08-13 11:25:13
483Risk analysis / Risk management / Actuarial science / Security / Software development process / Project management / Systems engineering process / IT risk management / Information Technology Security Assessment / Risk / Management / Ethics

INDEPENDENT REVIEW OF A PROPOSED REPLACEMENT FOR THE STATE’S CURRENT ALL-PAYER CLAIMS DATABASE (APCD), KNOWN IN VERMONT AS THE VERMONT HEALTH

Add to Reading List

Source URL: bgs.vermont.gov

Language: English - Date: 2015-01-15 14:30:29
484Systems engineering / National Nuclear Security Administration / United States Department of Energy / Reliability engineering / Government Accountability Office / Requirement / Government procurement in the United States / Science / Software development / Analysis of Alternatives / Military acquisition

GAO[removed]Highlights, DOE AND NNSA PROJECT MANAGEMENT: Analysis of Alternatives Could Be Improved by Incorporating Best Practices

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2014-12-11 15:17:21
485Model checkers / Applied mathematics / Model checking / NuSMV / Software testing / Formal verification / Role-based access control / Software development process / Formal methods / Access control / Security

Property Verification for Generic Access Control Models

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 10:19:28
486Clinical research / Quality / Validation / Formal methods / Software development process / Knowledge / Computer forensics / Computer security / Verification and validation / Pharmaceutical industry / Validity / Science

Codes Of Practice And Conduct GUIDANCE – GUIDANCE – GUIDANCE – GUIDANCE – GUIDANCE – GUIDANCE – GUIDANCE – GUIDANCE Draft Guidance: Digital Forensics Method Validation

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-09-18 04:54:10
487Computing / Embedded Linux / Android Market / Mobile software / Mobile operating system / Mobipocket / Motorola Droid / Rooting / Android software development / Software / Smartphones / Android

Fraunhofer Research Institution for A p p l i e d a n d I n t e g r at e d S e c u r i t y Android OS Security: Risks and Limitations A Practical Evaluation

Add to Reading List

Source URL: www.aisec.fraunhofer.de

Language: English - Date: 2015-01-15 07:02:10
488Information technology management / Enterprise architecture / ISO standards / Enterprise modelling / Integrated development environments / Enterprise Architect / Model-driven engineering / Entity-relationship model / Modeling language / Unified Modeling Language / Software engineering / Data modeling

Sparx Systems Enterprise Architect Supports Security Industry Association Standards Development Leading trade group in the electronic and physical security market adopts premier modeling tool for development of standards

Add to Reading List

Source URL: www.sparxsystems.com

Language: English - Date: 2013-07-22 11:31:41
489Business / Quality / Software development process / Computer security / Data security / ISO / Records management / Information security / Systems engineering process / Information technology management / Management / Software development

Proceedings Template - WORD

Add to Reading List

Source URL: purl.pt

Language: English
490Computer network security / Hacking / Software testing / Security / Vulnerability / Common Vulnerabilities and Exposures / Social vulnerability / Common Diagnostic Model / Clean Development Mechanism / Computer security / Cyberwarfare / Risk

Continuous Diagnostics and Mitigation (CDM) CDM Training Modules September 29, 2014 Version[removed]

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-10-08 14:30:53
UPDATE