Software assurance

Results: 2574



#Item
31QA to AQ Part Five Being Agile at Quality “Growing Quality Awareness and Expertise” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

QA to AQ Part Five Being Agile at Quality “Growing Quality Awareness and Expertise” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

Add to Reading List

Source URL: wirfs-brock.com

Language: English - Date: 2016-04-03 16:40:36
322016 JLAC TECHNICAL INFORMATION SEMINAR PROGRAM (as of) ■ Date and Time: Tuesday, 6 September:30 to 16:30 (doors open at 12:00) ■ Venue: CURIAN* (Shinagawa Community Center Hall) 8th Floor Main Hal

2016 JLAC TECHNICAL INFORMATION SEMINAR PROGRAM (as of) ■ Date and Time: Tuesday, 6 September:30 to 16:30 (doors open at 12:00) ■ Venue: CURIAN* (Shinagawa Community Center Hall) 8th Floor Main Hal

Add to Reading List

Source URL: www.accreditation.jp

Language: English - Date: 2016-07-28 01:13:23
33Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2012-06-04 07:35:14
34Hardening Software against Physical Attacks using Static Analysis Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Hardening Software against Physical Attacks using Static Analysis Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
35NetOps / Computing / Military communications / LandWarNet / Technology / Contemporary history / Configuration management / Interoperability

Information Assurance Vulnerability Management (IAVM) The Information Assurance Vulnerability Management provides the capability to define configuration and software base line requirements for various systems types. T

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:13:30
36MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011  Abstract

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
37Proceedings of theAutomated Software Engineering Workshop on Software Certificate Management (SoftCeMent’05)

Proceedings of theAutomated Software Engineering Workshop on Software Certificate Management (SoftCeMent’05)

Add to Reading List

Source URL: ti.arc.nasa.gov

Language: English
38PPQA-PLNProcess Quality Assurance Plan PPQA-PLN-0001 QUALITY ASSURANCE PLAN FOR

PPQA-PLNProcess Quality Assurance Plan PPQA-PLN-0001 QUALITY ASSURANCE PLAN FOR

Add to Reading List

Source URL: pinnaclesolutionsinc.com

Language: English - Date: 2013-10-17 17:00:55
39CE ULSETC OO MM EM R UcNaI se

CE ULSETC OO MM EM R UcNaI se

Add to Reading List

Source URL: www.air-watch.com

Language: English - Date: 2016-03-21 11:12:59
40Mini-Lessons from Juran Global The Source for Breakthrough Juran.com Series  Quality

Mini-Lessons from Juran Global The Source for Breakthrough Juran.com Series Quality

Add to Reading List

Source URL: www.juran.com

Language: English - Date: 2015-11-01 09:33:20