Software Development Security

Results: 957



#Item
71

Automating Threat Modeling through the Software Development Life-Cycle Guifr´e Ruiz1 , Elisa Heymann1 , Eduardo C´esar1 and Barton P. Miller2 Abstract— Fixing software security issues early in the development life-cy

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-10-01 14:04:11
    72

    Rugged Software Development Joshua Corman, David Rice, Jeff Williams SANS Application Security Summit February 5, 2010 Context

    Add to Reading List

    Source URL: www.ruggedsoftware.org

    - Date: 2012-09-04 15:03:22
      73Security Target / Ethics / Value / Quality assurance / Software development process / Professional certification / Evaluation Assurance Level / Evaluation / Common Criteria / Thought

      Microsoft Word - CCRA AC v2.1 - clean.doc

      Add to Reading List

      Source URL: www.commoncriteriaportal.org

      Language: English - Date: 2013-04-02 09:31:22
      74Ethics / Actuarial science / Security / Emergency management / Software development process / Financial risk / IT risk management / ISO / Risk / Management / Risk management

      Is  ISO  31000  fit  for  purpose?     The  debate   “Is  ISO  31  000  fit  for  purpose”  is  the  headline  above  a  debate  published  in  

      Add to Reading List

      Source URL: www.john-adams.co.uk

      Language: English - Date: 2012-08-01 14:24:41
      75Technology / App Store / Symantec / IOS / Mobile application management / Mobile apps / Mobile application development / Android / Mobile business intelligence / Computing / Software / Smartphones

      Symantec™ App Center Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview Symantec™ App Center provides integrated mobile application and device management capabilities for

      Add to Reading List

      Source URL: www.symantec.com

      Language: English - Date: 2014-04-16 03:39:03
      76Cloud clients / Embedded Linux / Android / Computer security / Android software development / Mobile application development / Google Chrome / Bring your own device / Virtual machine / Software / Computing / Smartphones

      Enabling BYOD through Secure Meta-Market ∗ Alessandro Armando

      Add to Reading List

      Source URL: www.csec.it

      Language: English - Date: 2014-08-26 05:34:09
      77Penetration test / Software testing / Surveillance / National Security Agency / Global Information Assurance Certification / Integrator / Software development process / Computer security / Computing / Computer network security

      Criteria for CSfC Integrators 5 May 2014

      Add to Reading List

      Source URL: www.nsa.gov

      Language: English - Date: 2014-09-12 11:51:25
      78Security / Computing / Common Criteria / Evaluation Assurance Level / Security Target / Penetration test / Integrity / Software development process / Application software / Evaluation / Computer security / Computer network security

      DOC Document

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2014-07-11 01:13:57
      79Emergency management / Public safety / Resilience / Security / Software development methodology / Motivation / Positive psychology / Psychological resilience

      Planning Measuring Resilience Potential and Early Warnings (SCALES

      Add to Reading List

      Source URL: www.rea-symposium.org

      Language: English - Date: 2013-05-31 07:02:12
      80Scripting languages / Cryptographic protocols / Secure communication / Firefox / Google Chrome / JavaScript / Transport Layer Security / Opera / Mobile application development / Software / Web browsers / Portable software

      A First Look at Firefox OS Security Daniel DeFreez∗ , Bhargava Shastry† , Hao Chen∗ , Jean-Pierre Seifert† ∗ University of California, Davis {dcdefreez, chen}@ucdavis.edu

      Add to Reading List

      Source URL: www.mostconf.org

      Language: English - Date: 2014-05-17 09:18:10
      UPDATE