Software security assurance

Results: 433



#Item
121Cyberwarfare / Security / Computer network security / Quality assurance / Software assurance / Standards organizations / Vulnerability / Penetration test / National Institute of Standards and Technology / Software quality / Computer security / Software testing

Software Assurance During Maintenance Paul E. Black U.S. National Institute of Standards and Technology (NIST) [removed] Abstract

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
122Software testing / Computer network security / Crime prevention / National security / Software security assurance / Vulnerability / Penetration test / Application security / Proprietary software / Security / Computer security / Cyberwarfare

Tips and Tricks Guide To tm Software Security Assurance

Add to Reading List

Source URL: www.principlelogic.com

Language: English - Date: 2009-08-04 07:42:58
123Evaluation / Computer security / Computer network security / Quality assurance / Software assurance / Vulnerability / Software security assurance / Penetration test / Application security / Software testing / Software quality / Cyberwarfare

Software Assurance Metrics And Tool Evaluation Las Vegas, Nevada, USA, June 27-30, 2005 P. E. Black Information Technology Laboratory

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:58
124National security / Computer security / Computer network security / Software testing / Software assurance / Software engineering / Software quality / Vulnerability / Application security / Security / Computing / Crime prevention

[removed]CL ACSAC essay revised for pub changes marked

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-05 00:33:44
125Evaluation / Systems engineering / Software assurance / Vulnerability / Software security assurance / Penetration test / National Institute of Standards and Technology / Test automation / Quality assurance / Software testing / Software quality / Software engineering

F E AT U R E S T O R Y SAMATE’s Contribution to Information Assurance by Paul E. Black

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
126Technology / Product management / Software project management / Software engineer / Software development / Software design / Systems engineering process / Software testing / Software security assurance / Software engineering / Project management / Business

SOFTWARE ENGINEERING TUTORIAL http://www.tutorialspoint.com/software_engineering/index.htm PDF Version Android App

Add to Reading List

Source URL: www.tutorialspoint.com

Language: English - Date: 2014-07-21 15:14:01
127Aspect-oriented programming / Computing / Aspect / X Window System / Computer security / Software development / Software / Aspect-oriented software development

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure D3.3 Guidelines for Deployment

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2015-02-06 09:04:21
128Data security / Cryptography standards / Computer network security / United States government secrecy / Security controls / FIPS 140-2 / Open Source Software Institute / OpenSSL / Global Information Assurance Certification / Security / Computer security / Computing

Global Information Assurance Certification Paper This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Copyright SANS Institute Author Retai

Add to Reading List

Source URL: www.oss-institute.org

Language: English - Date: 2012-10-17 10:57:26
129Software testing / Source code / Hacking / Vulnerability / Continuous integration / Software bug / Debian / Software quality / Quality assurance / Software development / Computing / Software

Source Code Analysis Made Easy The AppSec How-To Guide: Getting your Developers to Beg for Security Security is fascinating. It touches each and every one of us – whether we’re making an online credit card purchase,

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:11:04
130Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
UPDATE