Software security assurance

Results: 433



#Item
341Software quality / Systems engineering / Risk analysis / Reliability engineering / Safety Management Systems / Risk assessment / Life-critical system / Software assurance / Safety assurance / Risk / Safety / Security

PDF Document

Add to Reading List

Source URL: www.era.co.uk

Language: English - Date: 2011-12-14 06:51:26
342Information Risk Management / Business / Business software / Prevention / Risk management / Information assurance / TRAC / Information security management system / Information security / Security / Computer security / Data security

PDF Document

Add to Reading List

Source URL: www.ombudsman.org.uk

Language: English - Date: 2014-03-06 07:34:25
343Computer network security / Software testing / Web applications / Global Information Assurance Certification / Hacking / Web application security / Penetration test / Application security / Secure coding / Computing / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
344Software quality / Computer security / National security / Secure communication / Common Criteria / Software assurance / Ethics / Evaluation / Computer network security / Security

Response to NIST RFI “Developing a Framework to Improve Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-29 12:42:35
345Software engineering / NSA Suite B Cryptography / Encryption / End-user development / Cryptography / Disk encryption / National Security Agency

NATIONAL SECURITY AGENCY INFORMATION ASSURANCE DIRECTORATE Commercial Solutions for Classified (CSfC) Data-at-Rest (DAR) Capability Package

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-07-22 12:31:53
346Finance / Auditing / XBRL / Financial statement / Financial analyst / XBRL assurance / XBRLS / Business / Accountancy / Accounting software

October 29,2004 The New York Society of Security Analysts Committee for Improved Corporate Reporting 1601 Broadway, I lthfloor New York, NY[removed]Jonathan G. Katz, Secretary

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2004-11-04 07:53:20
347Computer security / Software quality / Vulnerability / Software assurance / Software as a service / IBM cloud computing / IICCRD / Cloud computing / Computing / Centralized computing

“What keeps you up at night?” "I am not sure that it will be a denial of service attack…… …. as much as it will be sloppy software implementation that has

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
348Computer network security / National security / Crime prevention / Data security / Information security / Information assurance / Vulnerability / Threat / Software assurance / Computer security / Security / Cyberwarfare

Microsoft Word - PPP Outline and Guidance FINAL.docx

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2011-07-18 15:18:30
349Actuarial science / Methodology / Software development process / Internal audit / Project management / SAP AG / United Nations Office of Internal Oversight Services / Information technology management / Quality assurance / Business / Auditing / Security

Microsoft Word - 22 March 2013_Final Audit Report Umoja SAP Implementation.doc

Add to Reading List

Source URL: usun.state.gov

Language: English - Date: 2014-08-22 02:59:17
350Software testing / Computer network security / Cloud computing / Veracode / Hacking / Application security / Vulnerability / Software assurance / Computer insecurity / Computer security / Computing / Cyberwarfare

Veracode Input for Developing a Framework to Improve Critical Infrastructure Cybersecurity Background Veracode provides automated and manual application security testing for over 300 organizations in the US and abroad. O

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:08:49
UPDATE