Software security assurance

Results: 433



#Item
231Software / Software testing / Metasploit Project / Application security / Software security assurance / HD Moore / Cyberwarfare / Computer network security / Computer security

Ensuring Endpoint Protection for Security Software The razor sharp focus of most security product vendors is undoubtedly based on the protection of sensitive customer data. Nevertheless, even the ‘best of breed’ play

Add to Reading List

Source URL: eleks.com

Language: English
232IT asset management / Information Technology Infrastructure Library / Configuration management / Asset management / Information security / Software asset management / Information assurance / Information technology management / Project management / Information technology

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MANUAL[removed]MARCH 2014 Incorporating Change 1, 28 August 2014

Add to Reading List

Source URL: static.e-publishing.af.mil

Language: English - Date: 2014-08-29 09:20:34
233United States Department of Homeland Security / Cyberwarfare / Hacking / Computer crimes / National Cyber Security Division / Software assurance / United States Computer Emergency Readiness Team / Control system security / International Multilateral Partnership Against Cyber Threats / Computer security / Security / National security

Safeguarding and Securing Cyberspace Safeguarding and Securing Cyberspace Our economic vitality and national security depend today on a vast array of interdependent and critical networks, systems, services, and resource

Add to Reading List

Source URL: www.ak-prepared.com

Language: English - Date: 2014-06-12 19:21:56
234Crime prevention / National security / Quality assurance / Software assurance / Computer security / Government procurement in the United States / Information security management system / International Multilateral Partnership Against Cyber Threats / Public safety / Security / Software quality / Data security

FROM THE PUBLISHER CrossTalk would like to thank DHS for sponsoring this issue. When organizations purchase software or software-reliant capabilities and services with inadequate consideration

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:32
235United States government secrecy / Computing / High Assurance Internet Protocol Encryptor / File managers / Windowing systems / Graphical Environment Manager / TACLANE / National Security Agency / IDIQ / Software / System software / Cryptographic protocols

Microsoft Word - GEM_X_Price[removed]doc

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-04 04:06:35
236Software quality / Crime prevention / National security / Computer security / Freeware / JGRASP / Software engineering / Software assurance / Cloud computing / Computing / Software / Security

Industrial Advisory Board meeting

Add to Reading List

Source URL: www.eng.auburn.edu

Language: English - Date: 2012-02-16 10:34:34
237Cyberwarfare / Crime prevention / National security / Quality assurance / Software assurance / Software security assurance / Vulnerability / National Cyber Security Division / National Strategy to Secure Cyberspace / Security / Computer security / Software quality

Software Assurance: A Strategic Initiative of the U.S. Department of Homeland Security to Promote Integrity, Security, and Reliability in Software

Add to Reading List

Source URL: www.psmsc.com

Language: English - Date: 2009-09-01 13:29:30
238Systems engineering / Software / Computing / Data security / Human resource management / Quality assurance / Software development methodology / Information systems / Information security / Software development / Software engineering / Software development process

State of California IT Personnel Professional Development Prepared by ITMA XII

Add to Reading List

Source URL: www.cioarchives.ca.gov

Language: English - Date: 2006-03-17 13:34:39
239Software quality / Software testing / Computer network security / National security / Software security assurance / Vulnerability / Threat model / Penetration test / Information security / Computer security / Security / Cyberwarfare

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Using Concept Maps to Introduce Software Security Assurance Cases

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:33
240Software development / Software testing / Quality assurance / Software development process / Software bug / Software quality / Open source software security / Coverity / Computer programming / Software engineering

CASE STUDY SIGMA3 Software crashes are a thing of the past now that SIGMA3 is Coverity Clean Sigma Cubed Inc. (SIGMA3) is an oil and gas services company

Add to Reading List

Source URL: www.coverity.com

Language: English - Date: 2014-09-05 12:12:56
UPDATE