Software security assurance

Results: 433



#Item
321Novell NetWare / Computer network security / Crime prevention / National security / Global Information Assurance Certification / Novell / CompTIA / Information technology audit / System administrator / Computing / Security / Proprietary software

Bradley A. Wilkerson E-mail: [removed] Professional Experience Contractor for DTE Energy, Newport, MI (February 2010 – Present) Senior Cyber Security Specialist, Fermi 2 Nuclear Plant

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2011-12-07 20:34:34
322Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
323Quality / Carnegie Mellon University / Standards / Capability Maturity Model Integration / Information technology management / Software assurance / Process area / Capability Maturity Model / ISO/IEC 15504 / Software development / Software development process / Software

Microsoft PowerPoint[removed]Bartol-Jarzombek Security Measurement Pres[removed]

Add to Reading List

Source URL: www.psmsc.com

Language: English - Date: 2009-09-01 13:30:53
324National Nuclear Security Administration / Nuclear safety / Quality assurance / Software quality / Quality management / Quality / Requirement / Quality management system / General contractor / Business / Evaluation / Technology

NNSA POLICY LETTER NAP-24 Approved: [removed]WEAPON QUALITY POLICY

Add to Reading List

Source URL: nnsa.energy.gov

Language: English - Date: 2013-08-21 10:47:31
325Cyberwarfare / Security / Computer network security / National security / Attack patterns / Vulnerability / Software assurance / Hacking / Software testing / Computer security

Attack Patterns: Knowing Your Enemy in Order to Defeat Them BlackHat DC[removed]Software Confidence. Achieved.

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
326Software / Technical communication / Technology / Software development process / Open-source software / Documentation / Open source / Software security assurance / Software design / Software licenses / Software development / Computer law

DS-4076 Commodity Jurisdiction (CJ) Guidance for Software Providing the following information will assist the U.S. Government reviewers in determining the regulatory jurisdiction of the product. In preparing the document

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2010-12-01 12:17:34
327Software quality / Technology / Security engineering / Business / United States Environmental Protection Agency / Quality assurance / Continuous emissions monitoring system

Hazardous Waste Cobustion Unit Permitting Manual

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-08-03 16:54:47
328Business / Capital gains tax / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / Tax / United States Department of Homeland Security / Corporate governance / Software assurance / Security / Computer crimes / Public safety

Microsoft Word - VOXEM NOI Response

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2013-04-29 11:44:44
329Cyberwarfare / Computer network security / CWE / Attack patterns / Vulnerability / Penetration test / Software testing / Hacking / Computer security

Software Assurance Engineering for Attacks Known Threat Actors

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 14:41:53
330Access control / Windows Server / Role-based access control / Virtual machines / Hyper-V / PERMIS / Social vulnerability / Logical partition / Cloud computing / System software / Security / Computing

CERIAS Tech Report[removed]Risk-Aware Virtual Resource Management for Access Control-Based Cloud Datacenters by Abdulrahman Almutairi, Arif Ghafoor Center for Education and Research Information Assurance and Security Purd

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2014-07-31 11:03:37
UPDATE