Software Development Security

Results: 957



#Item
631System software / Smartphones / Embedded Linux / APK / Dalvik / Malware / Computer virus / Binary XML / Mobile application development / Android / Software / Computing

APK File Infection on Android System Bob Pan Mobile Security Research Engineer July 27, 2012

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:41
632Computer security / Crime prevention / National security / Hacking / Attack patterns / Penetration test / Application security / Threat model / Security engineering / Security / Software testing / Cyberwarfare

The Balance of Secure Development and Secure Operations in the Software Security Equation Sean Barnum The MITRE Corporation

Add to Reading List

Source URL: cybox.mitre.org

Language: English - Date: 2011-10-27 15:29:15
633Information technology management / Technology / Business / Method engineering / Data security / Business case / Information Services Procurement Library / Government procurement in the United States / Stage–gate model / Project management / Management / Software development process

Departmental Records and Information Management Program

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2014-02-12 08:27:13
634Risk / Cyberwarfare / Computer network security / Penetration test / Vermont Energy Investment Corporation / Vulnerability / Mobile application development / Sitefinity / Social vulnerability / Software testing / Computing / Computer security

Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our c

Add to Reading List

Source URL: veic.org

Language: English - Date: 2014-07-25 16:23:39
635Ad hoc / Tax reform / Value added tax / Financial market

Accelerating International Business Development Cloud Computing, Social Networking, e-Commerce, Security, SmartPhones Semiconductors, Electronics, Software, Systems, Test Equipment January 2014

Add to Reading List

Source URL: www.vecta5.com

Language: English - Date: 2014-01-29 12:41:18
636Data security / Software engineering / Risk management / NIST Special Publication 800-53 / Systems development life-cycle / Security risk / Information security / Security controls / Vulnerability / Computer security / Security / Computing

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-06-26 10:22:50
637Software / McAfee / Mobile application management / Apperian / App Store / Mobile device management / Mobile apps / Enterprise mobility management / Mobile application development / Computing / Technology / Smartphones

Solution Brief Enterprise Mobile Application Management Deliver application security, adoption, and real-time monitoring

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-02-12 07:16:35
638Software quality / Software development methodology / Database / Software development process / Systems design / Application software / Software security assurance / Software testing / Software development / Software / Computing

SOFTWARE DEVELOPER-ADV Class Code: 076112

Add to Reading List

Source URL: www.treasury.state.tn.us

Language: English - Date: 2014-07-16 11:15:22
639Software requirements / Computing / Software project management / Abuse / Information security / Ident / Use case / Access control / Test case / Security / Software development / Computer security

Using Abuse Case Models for Security Requirements Analysis John McDermott and Chris Fox Department of Computer Science James Madison University Harrisonburg, Virginia[removed]E-mail: {mcdermot, fox}@cs.jmu.edu

Add to Reading List

Source URL: perceval.gannon.edu

Language: English - Date: 2010-03-10 13:11:59
640Risk / Cyberwarfare / Computer network security / Penetration test / Vermont Energy Investment Corporation / Vulnerability / Mobile application development / Sitefinity / Social vulnerability / Software testing / Computing / Computer security

Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our c

Add to Reading List

Source URL: www.veic.org

Language: English - Date: 2014-07-25 16:23:39
UPDATE