Software security assurance

Results: 433



#Item
211Evaluation Assurance Level / Software testing / Vulnerability / Social vulnerability / Cyberwarfare / Ethics / Risk / Computer security / Evaluation

Scheme note 16 - Additional planning requirements

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2014-06-30 08:27:41
212Computing / Common Criteria / National Information Assurance Partnership / Security Target / Apache Ant / Protection Profile / Evaluation / Software / Computer security

Evaluation of Platform-Dependent Products Interim Guidance As stated in the Position Statement Regarding the CC Evaluation of General Purpose Operating Systems, progress is being made in developing a sensible strategy to

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-08-04 14:46:17
213Federated identity / System software / Social issues / OpenID / Identity assurance / PERMIS / Privacy / Digital identity / Information Card / Identity management / Identity / Computer security

CAN ATTRIBUTE PROVISION, TOGETHER WITH IDENTITY ASSURANCE, TRANSFORM LOCAL GOVERNMENT SERVICES?

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2014-09-02 05:28:45
214Computer security / Federated identity / SAML 2.0 / OpenID / Security Assertion Markup Language / SAML-based products and services / OAuth / Identity assurance / Lightweight Directory Access Protocol / Identity management / Identity / System software

OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2014-04-24 07:01:11
215Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
216Data security / Computer network security / Penetration test / Software testing / CompTIA / Global Information Assurance Certification / Microsoft Certified Professional / System administrator / Qualys / Computing / Education / Computer security

Direct Technology, founded in 1995, is one of the largest privately held custom software development firms on the West Coast, headquartered in Roseville, CA with an additional office in Bellevue, WA. Direct Technology’

Add to Reading List

Source URL: www.travisafrc.com

Language: English - Date: 2014-11-15 18:38:08
217Security / United States Department of Homeland Security / Computer crimes / National Cyber Security Division / Cyber-security regulation / United States Computer Emergency Readiness Team / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Software assurance / Computer security / National security / Cyberwarfare

Safeguarding and Securing Cyberspace Safeguarding and Securing Cyberspace The Department has the lead for the federal government for securing civilian government computer systems, and works with industry and state, loca

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-04 10:16:35
218Quality assurance / Software assurance / Software quality / Public safety / Cyberwarfare / National Cyber Security Division / Computer security / Open-source software / Information security / Security / Crime prevention / National security

Software Assurance (SwA) Forum and Working Group Sessions Fact Sheet BACKGROUND The Software Assurance (SwA) stakeholder community serves an essential role in protecting government applications, systems, and information

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-28 09:20:31
219Quality assurance / Software assurance / Software testing / Morgridge Institute for Research / Debian / Vulnerability / Miron Livny / Software quality / Software / Computing

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-20 11:44:06
220Quality assurance / Software assurance / Software quality / Computer security / Vulnerability / Static program analysis / Cyberwarfare / Software testing / Evaluation / Program analysis

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 14:23:51
UPDATE