Software security assurance

Results: 433



#Item
151Cyberwarfare / Computer network security / Penetration test / Information security / Evaluation / Vulnerability / Information assurance / Information technology audit process / Computer security / Software testing / Security

Interhack 5 E Long St 9th Fl Columbus, OH[removed]VOX +[removed]HACK FAX +[removed]

Add to Reading List

Source URL: web.interhack.com

Language: English - Date: 2013-01-04 13:33:30
152Computer security / Program analysis / Hacking / Vulnerability / Cross-platform software / Coverity / Static program analysis / Common Vulnerabilities and Exposures / Software assurance / Software testing / Software / Cyberwarfare

Special Publication[removed]Report on the Third Static Analysis Tool Exposition (SATE[removed]Editors: Vadim Okun

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
153Safenet / Hypervisor / Hardware security module / Virtualization / Cloud computing / Hyper-V / Secure communication / Cryptographic software / System software / Computing / Software

SafeNet Ushers in New Era of Elastic Encryption by Announcing World’s First Crypto Hypervisor Multi-tenant, High-Assurance Key Vaulting for Cloud Migration • • •

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:24
154Software / Reputation management / Sociology / Security / Software development process / Trust / Software assurance / Software development methodology / Dependability / Software development / Ethics / Formal methods

In a trustworthy software model, there would be a trustworthy index (TA/T, with values between “0”and “1”, “0” being totally u

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
155Computing / Software testing / Web application security scanner / Vulnerability / Application security / Software assurance / Web application security / Malware / National Institute of Standards and Technology / Computer security / Cyberwarfare / Computer network security

SAMATE Project Update Paul E. Black Romain Gaucher National Institute of Standards and Technology http://samate.nist.gov/ [removed]

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
156Software testing / Red Lizard Software / Sonar / Software quality / Static program analysis / Software bug / OWASP / Vulnerability / Goanna / Computing / Software engineering / Computer programming

Deep Static Analysis for Security and Quality Assurance Goanna™ is the leading static C/C++ code analysis solution for detecting security vulnerabilities and quality issues in safety critical embedded software. Support

Add to Reading List

Source URL: archive.redlizards.com

Language: English - Date: 2015-03-08 20:44:06
157Software development / Software engineering / Quality assurance / Software assurance / Software development process / Application security / Reliability engineering / IEEE 829 / ISO/IEC / Software quality / Software testing / Evaluation

National Institute of Standards and Technology U.S. Department of Commerce NISTIR 7920

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:56
158Software testing / Evaluation / Quality assurance / Acceptance testing / Sewer / Closed-circuit television / Security / National security / Public safety

Sewer Acceptance Testing Specification Sewer Acceptance Testing Specification – August 2012 Document details

Add to Reading List

Source URL: www.citywestwater.com.au

Language: English - Date: 2014-09-21 22:53:38
159Program analysis / Software quality / Computer security / Hacking / Vulnerability / Static program analysis / Software assurance / Software testing / Software engineering / Evaluation

Static Analysis Tool Exposition

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
160Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
UPDATE