Software security assurance

Results: 433



#Item
221Request for proposal / Tats / Government procurement in the United States / Data & Analysis Center for Software / Information Assurance Technology Analysis Center / United States Department of Defense / Business / Defense Technical Information Center

CS TAT RFP Announcement 24 October, 2014 DTIC and the DoD IACs are pleased to announce the issuance of a Request for Proposals (RFP) for the Cyber Security and Information Systems Technical Area Tasks (CS TAT) contract.

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-10-24 10:51:22
222Emergency management / National Cyber Security Division / Critical infrastructure protection / National Infrastructure Protection Plan / DHS Directorate for Science and Technology / Federal Emergency Management Agency / United States Computer Emergency Readiness Team / National Incident Management System / Critical infrastructure / United States Department of Homeland Security / National security / Public safety

Appendix B – Index Appendix B – Index A Academic Engagement Automating Software Assurance, 57

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-04 10:14:54
223National security / Computing / Computer network security / Global Information Assurance Certification / Software testing / Information security / Consensus audit guidelines / Penetration test / Application security / Security / Computer security / Crime prevention

S A N S I T S e c u r i t y Tr a i n i n g a n d Yo u r C a r e e r R o a d m a p S E C U R I T Y C U R R I C U L U M Beginners

Add to Reading List

Source URL: alliance.cisecurity.org

Language: English - Date: 2013-08-13 17:23:13
224Information technology management / Software / Capability Maturity Model / Security / ISO/IEC 21827 / Security engineering / Certified Information Systems Security Professional / Process / Quality assurance / Software development / Software development process / Data security

The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
225Technology / Software / TestComplete / Unit testing / Test automation framework / Test automation / Quality assurance / Internationalization and localization / Software testing / Graphical user interface testing / Automation

Automated Testing of Localization Automated UI localization tests to save time and reduce errors Project Automated testing for localization of security

Add to Reading List

Source URL: eleks.com

Language: English
226Crime prevention / National security / Cyberwarfare / Information Risk Management / Information assurance / Vulnerability / Information security / Software assurance / Software security assurance / Security / Computer security / Data security

Information Assurance Metrics: Prophecy, Process, or Pipedream? Panel Chair: Ronda R. Henning, Harris Corporation Panelists: Michael J. Skroch, DARPA John McHugh , Carnegie Mellon Center for Survivable Systems John Micha

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
227Security / FIPS 140-2 / FIPS 140 / Software security assurance / Validation / Tamper resistance / Verification and validation / Software testing / Software verification / Cryptography standards / Cryptography / Computer security

Validating a High-Performance, Programmable Secure Coprocessor Sean Smith Ron Perez

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
228Quality management / Quality assurance / Test automation / Book:Software testing / HP Quality Center / Software testing / Software / Technology

ELEKS’ Localization QA – high quality enterprise security software in all supported languages ELEKS’ qualified software testers performed localization testing of enterprise software based on a strong knowledge and

Add to Reading List

Source URL: eleks.com

Language: English
229ISO standards / Java platform / Java Card / Common Criteria / Evaluation Assurance Level / Java / Computer security / Protection Profile / Interpreter / Computing / Cross-platform software / Evaluation

Using B Method to Formalize the Java Card Runtime Security Policy for a Common Criteria Evaluation Stéphanie Motré - Corinne Téri [removed] - [removed] Gemplus - Avenue du Pic de Berta

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
230Malware / Usability / Technology / System testing / Computer security / Manufacturing / Acceptance testing / Software security assurance / Software testing / Antivirus software / Security

Contact us: [removed] www.eleks.com ELEKS’ Functional Testing Ensures High Quality Security Software Solutions By creating “real world” conditions, ELEKS was able to test the security software

Add to Reading List

Source URL: eleks.com

Language: English
UPDATE