Software security assurance

Results: 433



#Item
281Science / Project management / Systems engineering process / Evaluation methods / Systems science / Software security assurance / Empowerment evaluation / Methodology / Software development process / Software engineering

Carroll County Public Schools Instructional Technology (Software, Hardware and Web Based Resources) Evaluation Process Introduction

Add to Reading List

Source URL: www.carrollk12.org

Language: English - Date: 2011-08-22 10:13:41
282Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Global Information Assurance Certification / Consensus audit guidelines / Threat / Computer security / Computer network security / Cyberwarfare

DOC Document

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:07
283Federal Information Security Management Act / National Institute of Standards and Technology / Information security / Vulnerability / Security controls / Security risk / Software assurance / NIST Special Publication 800-53 / Security Content Automation Protocol / Computer security / Security / Cyberwarfare

Testimony of Cita M. Furlani Acting Director Information Technology Laboratory

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-08-30 15:11:00
284Software / Common Criteria / Protection Profile / Security Target / National Information Assurance Partnership / Evaluation Assurance Level / Mac OS X / Operating system / Security-evaluated operating system / Computer security / Evaluation / Computer architecture

Common Criteria Certification: Apple’s Ongoing Commitment to Security Introduction Apple has always been committed to providing the safest, most user-centered computing experience possible. Mac OS X is built on a rock-

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2007-06-05 20:38:44
285Security / Public safety / Computer crimes / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / National Cybersecurity Center / National Protection and Programs Directorate / Software assurance / Telecommunications Industry Association / Cyberwarfare / United States Department of Homeland Security / Computer security

Response of the Telecommunications Industry Association to the Department of Homeland Security’s Solicitation Number RFI20140220, Cyber Security Solutions for Small/Medium Sized Businesses April 4, 2014 Point of Conta

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2014-04-10 14:16:01
286National security / Computer security / Data security / Information security / Organizational culture / Schema / Fundamental attribution error / Risk / Software security assurance / Security / Public safety / Crime prevention

Microsoft Word - CH35 current.DOC

Add to Reading List

Source URL: www.mekabay.com

Language: English - Date: 2010-05-26 03:10:59
287Software / Macintosh / Xserve / Common Criteria / Power Mac G4 / Classic Environment / Darwin / PowerBook G4 / Information technology security audit / Computer architecture / Computing / Mac OS X

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2007-06-05 20:38:44
288Software quality / Software development methodology / Database / Software development process / Systems design / Application software / Software security assurance / Software testing / Software development / Software / Computing

SOFTWARE DEVELOPER-ADV Class Code: 076112

Add to Reading List

Source URL: www.treasury.state.tn.us

Language: English - Date: 2014-07-16 11:15:22
289Computer network security / Software testing / Hacking / Vulnerability / Electronic commerce / Application security / Software assurance / Cross-site scripting / Social vulnerability / Cyberwarfare / Computer security / Security

© Route66 | Dreamstime.com Insecure IT O

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-24 01:00:00
290Cyberwarfare / Security / Software testing / Common Criteria / National security / National Information Assurance Partnership / Evaluation Assurance Level / Penetration test / Protection Profile / Computer security / Evaluation / Computer network security

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report ForeScout CounterACT v6[removed]with Hotfix v6.11070

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-18 15:13:00
UPDATE