Software Development Security

Results: 957



#Item
81Technology / Software quality / Data security / Formal methods / Systems engineering process / IT risk management / Quality assurance / Reliability engineering / Software development process / Systems engineering / Science / Information technology management

Department of Information Technology IV&V Guidelines [Which, e.g. Initial, Interim, Final] IV&V Report: [Agency Name] [Deliverable Name and/or #]

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-07-21 15:53:24
82Computer security / Evaluation / Software bugs / Common Criteria / Reliability engineering / Bug tracking system / Vulnerability / Software development process / Usability / Software testing / Software development / Software quality

Chapter 23: System Evaluation and Assurance C H A P TE R 23 System Evaluation and

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
83Security / Security Assertion Markup Language / Password / Provisioning / Authentication / Federated identity management / Identity management system / Identity management / Computer security / System software

Product Development Status

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2015-03-29 10:43:02
84Video game development / All Pro Sound / Home automation / Electronic Arts / Technology / Software development / ADT Security Services / Boca Raton /  Florida / Tyco International

CE COVER STORY OVERVIEW CE Pro 100 REVENUES UP 6%,

Add to Reading List

Source URL: www.ceprosummit.com

Language: English - Date: 2015-05-13 13:16:45
85JavaScript / Scripting languages / Software architecture / Portable software / Cross-site request forgery / HTTP cookie / Mashup / Cross-site scripting / Google Chrome / Software / Computing / Web development

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-12-02 06:10:56
86Computing / Computer network security / Electronic commerce / Crime prevention / National security / Agile software development / Application security / Vulnerability / Software development process / Software development / Security / Computer security

® ® Agile Software Security Every build,

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-06-20 10:26:52
87Software development / STAR / Exploratory testing / Test automation / Application security / Model-based testing / Unit testing / Vulnerability / Software testing / Software quality / Evaluation

EXTRA PROGRAM SUNDAY MAY 17TH - BONUS SESSIONS 11:00-16:30 13:00-18:00 16:00-18:00 * Program subject to change

Add to Reading List

Source URL: btdconf.com

Language: English - Date: 2015-04-19 16:09:36
88Computer security / Computer network security / Electronic commerce / Crime prevention / National security / Agile software development / Application security / Software development process / Vulnerability / Software development / Security / Computing

® ® Agile Software Security Every build,

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-19 09:31:13
89Software licenses / Computing / Computer law / Software testing / Software quality / Open-source software / Proprietary software / Vulnerability / Software development process / Computer security / Computer network security / Cyberwarfare

Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security Carl E. Landwehr Institute for Systems Research University of Maryland, College Park Abstract:

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
90Web development / JavaScript / Security / Computer network security / Ajax / OWASP / XMLHttpRequest / Cross-site request forgery / Web 2.0 / Computing / World Wide Web / Software

Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Shreeraj Shah Blueinfy Solutions Pvt. Ltd.

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:09:08
UPDATE