Software security assurance

Results: 433



#Item
301Computer security / Crime prevention / National security / Computer network security / Dependability / Vulnerability / Information security / ISO/IEC 27004 / Software assurance / Security / Prevention / Public safety

Microsoft Word - SecurityWhitePaper3.0.doc

Add to Reading List

Source URL: www.psmsc.com

Language: English - Date: 2009-09-01 11:35:59
302Web 2.0 / Cross-platform software / Social media / Android software / Internet privacy / Facebook / Gmail / Twitter / Skype / Software / Computing / World Wide Web

OIYP and Digital Security What is ‘digital security’? Digital security can be defined as the protection of the „online self‟, meaning the assurance that the integrity and privacy of the user‟s personal data is

Add to Reading List

Source URL: oiyp.oxfam.org.au

Language: English - Date: 2012-09-25 21:34:46
303Computing / Applied Physics Laboratory / Laurel /  Maryland / IBM software / APL / TacSat-4 / Space and Missile Systems Center / Design review / Quality assurance / Technology / APL programming language family / Johns Hopkins University

National Security Space Program Management Peter D. Cook he National Security Space (NSS) enterprise is a construct composed of systems planned and fielded by Department of Defense and civil and intelligence elements of

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2010-12-23 10:21:18
304Computer security / Occupations / Software engineering / Systems assurance / Public safety / Software assurance / Software security assurance / Security / Quality assurance / Systems engineering

Microsoft Word - 2014_06_10-SoSECIE-Daughtrey.docx

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-04-01 15:38:10
305Quality assurance / Healthcare / Higher education in the United Kingdom / Quality Assurance Agency for Higher Education / Nursing home / Medicaid / Microsoft PowerPoint / Nursing / Surveying / Medicine / Health / Software

DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop S2[removed]Baltimore, Maryland[removed]Center for Medicaid and State Operations/Survey and Certification

Add to Reading List

Source URL: healthandwelfare.idaho.gov

Language: English - Date: 2009-07-06 09:39:04
306Software assurance / Software quality / Cyberwarfare / United States Department of Defense / Vulnerability / Security / Computer security / Quality assurance

Microsoft PowerPoint - 2013_10_30_NDIA-SEC-SwA_Baldwin-Approved.pptx

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2013-11-21 18:53:36
307Software development process / Software engineering / Software maintenance / Application software / Software development methodology / Systems development life-cycle / Outline of software engineering / Software security assurance / Software development / Software / Computing

Information Resources Management Policy Manual CHAPTER 4 - SOFTWARE MANAGEMENT – July 21, 1987

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:06:16
308Data security / Software quality / Software testing / Information security management system / Software security assurance / Software assurance / Vulnerability / Application security / Quality assurance / Security / Computer security / Cyberwarfare

Software Assurance Maturity Model A guide to building security into software development Version - 1.0 For the latest version and additional info, please see the project web site at

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2009-03-25 12:41:55
309Security / Software testing / Hacking / Vulnerability / Common Criteria / Software development process / Software security assurance / Application security / Computer security / Computer network security / Cyberwarfare

A vulnerability management process for IT product vendors - technical note 05/04

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2011-01-25 12:59:58
310Access control / Cryptographic software / Identity management / Authentication / Authorization / Passphrase / Encryption / Cryptography / Security / Disk encryption

Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-01-14 21:07:53
UPDATE