Software security assurance

Results: 433



#Item
361Computer network security / Software testing / Software quality / Security engineering / Quality assurance / Software assurance / Critical infrastructure protection / Vulnerability / Malware / Security / National security / Computer security

MITIGATING RISKS OF COUNTERFEIT AND TAINTED COMPONENTS Non-Malicious Taint Bad Hygiene is as Dangerous to the Mission as Malicious Intent Robert A. Martin, MITRE Corporation

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:20
362Security Target / Ethics / Value / Quality assurance / Software development process / Professional certification / Evaluation Assurance Level / Evaluation / Common Criteria / Thought

Microsoft Word - CCRA AC v2.1 - clean.doc

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-04-02 09:31:22
363Software testing / Evaluation / Crime prevention / National security / Application security / Quality assurance / Software development process / Information security / Software assurance / Security / Computer security / Computing

Security in Development: The IBM Secure Engineering Framework

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2010-03-18 15:35:26
364Software security assurance / Common Weakness Enumeration / Security / Mitre Corporation / Fortify Software / Software assurance / National Security Agency / Evaluation / Software quality / National security / Security engineering

Being Explicit About Weaknesses Robert A. Martin - MITRE Sean Barnum - Cigital Steve Christey - MITRE 1 March 2007

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:30:15
365Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
366Computer network security / Hacking / Software testing / Software quality / Vulnerability / Software assurance / Common Vulnerabilities and Exposures / Attack / Malware / Cyberwarfare / Computer security / Security

FROM THE SPONSOR CrossTalk would like to thank DHS for sponsoring this issue. Our information and communications technology (ICT) assets are under constant attack. Thwarting the active attacker is not something most des

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:21
367Computer network security / Software testing / Centralized computing / Cloud computing / Hacking / Cloud computing security / Vulnerability / Penetration test / Application security / Computer security / Computing / Cyberwarfare

SECURING THE CLOUD Applying Software Assurance Concepts to the Cloud Randall Brooks, Raytheon

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2013-09-11 16:21:26
368Computer security / Cyberwarfare / Vulnerability / Software assurance / Software development / Carnegie Mellon University / Software Engineering Institute

A Framework for Modeling the Software Assurance Ecosystem: Insights from the Software Assurance Landscape Project

Add to Reading List

Source URL: www.sei.cmu.edu

Language: English - Date: 2010-08-20 09:17:48
369Computer network security / Software testing / Hacking / Software bugs / Attack patterns / Vulnerability / CWE / Common Weakness Enumeration / Software assurance / Cyberwarfare / Computer security / Computing

Software Assurance Pocket Guide Series: Development, Volume II Version 2.3, November 1, 2012 Software Assurance (SwA) Pocket Guide Resources This is a resource for ‘getting started’ in selecting and adopting releva

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-11-01 17:01:27
370Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-03-02 12:21:16
UPDATE