Software security assurance

Results: 433



#Item
411Science / Software quality / Software development process / Software / Reliability engineering / Waterfall model / Software security assurance / Software system safety / Project management / Software engineering / Software development

Software Engineering Computer Science Tripos Part IA, Part II (General) and Diploma Lent Term, 1997

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2003-04-22 12:32:54
412Computer network security / Crime prevention / National security / Software testing / OSI model / Vulnerability / Application firewall / Access control / Quality assurance / Security / Computing / Computer security

Information Security Management Handbook 2009

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2013-01-29 10:50:13
413Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2011-02-22 19:36:24
414Crime prevention / National security / Computer network security / Data security / Information security / Vulnerability / Password / Information security audit / Software security assurance / Security / Computer security / Cyberwarfare

What is Information Security? Information Security is simply the process of keeping information secure: protecting its availability, integrity, and privacy. Information has been valuable since the dawn of mankind: e.g.

Add to Reading List

Source URL: www.demop.com

Language: English - Date: 2007-11-14 09:08:46
415Cryptographic protocols / HTTP / Electronic commerce / HTTP Secure / Google Chrome / Firefox / Gmail / Public key certificate / Global Information Assurance Certification / Software / Computing / Secure communication

Electronic Pickpockets Are Right Behind You Andrew Case – Senior Security Analyst 1 Who Am I?

Add to Reading List

Source URL: www.digitalforensicssolutions.com

Language: English - Date: 2012-06-23 17:19:20
416Computer security / Intrusion detection system / Information Assurance Technology Analysis Center / Network intrusion detection system / Intrusion prevention system / Snort / Host-based intrusion detection system / Anomaly detection / Sourcefire / Computer network security / System software / Software

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
417System software / Federated identity / Aetna / Companies listed on the New York Stock Exchange / Security Assertion Markup Language / SAML 2.0 / Liberty Alliance / Identity assurance / Health Insurance Portability and Accountability Act / Identity management / Identity / Computer security

LIBERTY ALLIANCE

Add to Reading List

Source URL: www.projectliberty.org

Language: English - Date: 2010-06-02 13:18:23
418Systems engineering / Computing / Security / Software quality / Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / Information technology security audit / Evaluation / Computer security / Knowledge

A Common Criteria Based Approach for COTS Component Selection Wes J. Lloyd

Add to Reading List

Source URL: pdf.aminer.org

Language: English - Date: 2011-10-18 07:42:30
419Software quality / Software testing / Common Weakness Enumeration / Software security assurance / Hacking / Vulnerability / Veracode / Software assurance / CWE / Computing / Software / Computer security

Certifying Applications for Known Security Weaknesses The Common Weakness

Add to Reading List

Source URL: www.omg.org

Language: English - Date: 2009-05-28 13:25:57
420Cyberwarfare / Computing / Crime prevention / National security / Data security / Data loss prevention software / Information security / Data breach / Threat / Computer security / Security / Computer network security

ACC 626 IT ASSURANCE & GOVERNANCE Information Leakage & Data Loss Prevention

Add to Reading List

Source URL: uwcisa.uwaterloo.ca

Language: English - Date: 2013-05-16 15:53:08
UPDATE