Software security assurance

Results: 433



#Item
161Software engineering / Formal methods / Evaluation / Ada programming language / SPARK / Reliability engineering / Evaluation Assurance Level / Functional specification / Common Criteria / Software development / Computing / Systems engineering

Engineering the Tokeneer Enclave Protection Software Janet Barnes, Rod Chapman: Altran Randy Johnson, James Widmaier: National Security Agency David Cooper: River River Limited

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2014-01-21 09:38:38
162Evaluation / Software assurance / CISQ / Reliability engineering / Object Management Group / Open standard / Software / Vulnerability / Computer security / Software quality / Software engineering / Systems engineering

Microsoft Word - CISQ response to File Number S7-01-13 - #80-120

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2013-09-17 00:19:31
163Security / Cyberwarfare / Crime prevention / National security / Penetration test / Vulnerability / Quality assurance / Information security / SecurityMetrics / Software testing / Computer security / Computer network security

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2015-03-05 07:19:56
164Systems engineering / Software Engineering Institute / Reliability engineering / CISQ / Carnegie Mellon University / Vulnerability / Computer security / Software assurance / Carnegie Mellon Silicon Valley / Software quality / Software engineering / Software development

Predicting Software Assurance Using Quality and Reliability Measures

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2015-02-05 11:41:03
165Cyberwarfare / Crime prevention / Software testing / National security / Global Information Assurance Certification / Penetration test / Web application security / Honeypot / Security guard / Computer network security / Security / Computer security

7x11 card Program Guide Insert

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-05-31 12:46:20
166Computer network security / Data security / Software testing / SANS Institute / Penetration test / Consensus audit guidelines / Information technology security audit / Global Information Assurance Certification / Information technology audit / Computer security / Security / Cyberwarfare

Rocky Mountain 2013 Denver, CO • July 14-20, 2013

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-05-01 15:54:10
167Data modeling / Computing / Diagrams / Automata theory / Digital electronics / Unified Modeling Language / Communications protocol / Finite-state machine / Activity diagram / Models of computation / UML diagrams / Software engineering

NRL Release Number[removed]Visual Security Protocol Modeling J. McDermott Center for High Assurance Computer Systems

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 12:50:29
168Cyberwarfare / Crime prevention / National security / Global Information Assurance Certification / SANS Institute / Penetration test / Application security / White hat / Network security / Computer network security / Security / Computer security

Security East 2013 January 16-23, 2013 THE MOST TRUSTED SOURCE FOR INFORMATION AND SOFTWARE SECURITY TRAINING Hands-on immersion training programs,

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2012-11-02 12:55:26
169Computer network security / Software testing / Hacking / Alarms / Burglar alarm / Computer security / Vulnerability / Survivability / Stochastic / Security / Statistics / Safety

NRL Release Number[removed]Attack-Potential-Based Survivability Modeling for High-Consequence Systems∗ J. McDermott Center for High Assurance Computer Systems

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 12:57:08
170Security / Penetration test / Attack / Timing attack / Computer network security / Cyberwarfare / Computer security

INCIDENT RESPONSE & INVESTIGATION SERVICES • PENETRATION TESTING • SECURITY RESEARCH • SOFTWARE ENGINEERING SECURITY ASSURANCE • SECURITY ARCHITECHTURE & DESIGN ASSURANCE • TRAINING Pixel Perfect Timing Attacks

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-03 09:26:33
UPDATE