Software Development Security

Results: 957



#Item
601Software / Computing / Data security / Configuration management / Method engineering / Technical communication / Business requirements / Information security / Information systems / Software development / Database management systems / Systems engineering

Attachment J.2 Description of Labor Categories (20-Mar-12) As noted in Article H.1, Labor Categories, the labor category descriptions provided in this attachment represent the government’s best estimate of the kinds of

Add to Reading List

Source URL: www.technatomy.com

Language: English - Date: 2013-01-11 16:36:30
602Data transmission / Protocols / Data management / Computer security / Data security / Winston Smith Project / Data mining / Data / Information / Communications protocol

PROPOSED ROMA Next Generation Performance Management Principles Agency Level Development of protocols that include plans for updating computer hardware, software, and networks as well as staff training and support. Agen

Add to Reading List

Source URL: www.roma1.org

Language: English - Date: 2014-08-05 17:17:22
603Information technology management / Data security / Compliance and ethics program / Software asset management / Infrastructure / Construction / Development

Microsoft Word - Guide for Municipal Asset Management Plans (2).docx

Add to Reading List

Source URL: www.auma.ca

Language: English - Date: 2014-05-22 13:13:40
604Portable software / Web development / NPAPI / Google Chrome / Adobe Flash / Plug-in / Google Native Client / HTTP cookie / Firefox / Software / Application programming interfaces / Cross-platform software

How I Learned to Stop Worrying and Love Plugins Chris Grier Samuel T. King University of Illinois downloads and install malware automatically[removed]Although mechanisms for plugin security are well understood, current pol

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
605Software development / Model-based testing / System testing / Oracle / KeY / Test automation framework / Test automation / Functional specification / Test plan / Software testing / Technology / Software quality

Model-based Approach to Security Test Automation Mark Blackburn Robert Busser Aaron Nauman Software Productivity Consortium/T-VEC 2214 Rock Hill Road, Herndon, VA 20170

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
606ITunes / IOS / IPhone / Smartphones / Multi-touch / IPad / Password / App Store / Mobile application development / Software / Computing / Apple Inc.

Bright House Networks Home Security and Control Mobile Application Quick Start Guide

Add to Reading List

Source URL: brighthouse.com

Language: English - Date: 2014-10-16 18:56:08
607Java enterprise platform / Software architecture / Web development / Java Platform /  Enterprise Edition / Web application / Apache Tomcat / Transport Layer Security / Microsoft Certified Professional / WebObjects / Computing / Software / Web application frameworks

Responsible Use of University Computing Resources Policy Document Web/Database Application Development and Verification Testing Policies 1. Purpose

Add to Reading List

Source URL: www.montclair.edu

Language: English - Date: 2014-08-13 15:05:34
608Quality assurance / Academi / Daniels / Security / Health / Business / Accreditation / Healthcare in the United States / Joint Commission

FORMER EMPIRE STATE DEVELOPMENT EMPLOYEE FINED FOR ILLEGAL CONFLICT Official worked for the State while also consulting for a private software company seeking State grants ALBANY (Feb. 20, [removed]The Joint Commission

Add to Reading List

Source URL: www.jcope.ny.gov

Language: English - Date: 2014-02-20 15:15:50
609Computer security / Software testing / Computer network security / Crime prevention / National security / Application security / Penetration test / Vulnerability / Simple DirectMedia Layer / Security / Software / Computing

Security Program Development and Management The best defense is often a good offense. Take a proactive approach to application security with an end-to-end security program from Casaba. Why Build a Security Program with C

Add to Reading List

Source URL: www.casaba.com

Language: English - Date: 2011-10-26 15:53:50
610Information technology management / Software / Security / Software Engineering Institute / Capability Maturity Model / Risk management / Carnegie Mellon Silicon Valley / Evolutionary Process for Integrating COTS-Based Systems / Software development / Software development process / Carnegie Mellon University

Technical Report CMU/SEI-96-TR-012 ESC-TR[removed]Software Risk Management

Add to Reading List

Source URL: www.sei.cmu.edu

Language: English - Date: 2004-05-17 10:22:06
UPDATE