Software Development Security

Results: 957



#Item
491Computer network security / Vulnerability / Software asset management / Threat / Rootkit / Software development process / Software / Operating system / Blacklist / Cyberwarfare / Computer security / Security

SWAM_Datasheet_15NOV13_WORKING_DRAFT

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:22
492Computer network security / Malware / Rootkit / Software development process / Software asset management / Antivirus software / Security / Cyberwarfare / Computer security

SWAM Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:18
493Web development / JavaScript / HTML / Cross-platform software / Node.js / Server-side scripting / Form / Web application / HTTP cookie / Computing / Software / Scripting languages

A Security Architecture for Server-Side JavaScript: Extended Abstract Willem De Groef Fabio Massacci

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
494Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
495Information technology management / Computing / Hacking / Software testing / Vulnerability / Software asset management / Malware / Software development process / Threat / Computer network security / Computer security / Cyberwarfare

CDM Software Asset Management (SWAM) Capability

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-03-19 13:26:58
496Configuration management / Method engineering / Technical communication / Software development process / Software asset management / Computer security / Information technology management / Software development / Security

CSM Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:37:55
497Data security / Computer network security / Penetration test / Software testing / CompTIA / Global Information Assurance Certification / Microsoft Certified Professional / System administrator / Qualys / Computing / Education / Computer security

Direct Technology, founded in 1995, is one of the largest privately held custom software development firms on the West Coast, headquartered in Roseville, CA with an additional office in Bellevue, WA. Direct Technology’

Add to Reading List

Source URL: www.travisafrc.com

Language: English - Date: 2014-11-15 18:38:08
498Scripting languages / Mobile application development / Python / Software development / Application security / Microsoft Visual Studio / .NET Framework / Cross-platform / Windows Phone / Computing / Software / Computing platforms

Inspection of Windows Phone applications Dmitry Evdokimov, ERPScan, [removed] Andrey Chasovskikh, [removed] BlackHat Abu Dhabi 2012 Abstract. Nowadays, the number of smartphone users is g

Add to Reading List

Source URL: andreycha.info

Language: English - Date: 2012-12-06 11:18:51
499Cyberwarfare / Agile software development / DevOps / Information technology management / Software development process / Node.js / Load balancing / Tor / Firewall / Computing / Software / Computer network security

LineRate DevOps Reference Architecture LineRate puts the power of custom traffic management within reach with a high-performance, easy-to-manage application router designed for application developers.

Add to Reading List

Source URL: linerate.f5.com

Language: English
500Security / Systems science / Computer security / Data security / Requirement / Information security / Systems engineering process / Reliability engineering / Systems engineering / Software development / Software requirements

TITLE: INSTRUCTOR: OTHER SPEAKERS: SUMMARY: SPECIFYING SYSTEM SECURITY REQUIREMENTS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE