Software security assurance

Results: 433



#Item
51Computing / Crime prevention / National security / Software quality / Software security assurance / Vulnerability / Software assurance / Threat model / Application security / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development A Guide to the Most Effective Secure Development Practices in Use Today OCTOBER 8, 2008 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:40
52Computing / Formal methods / Evaluation / Software project management / Computer security / Software assurance / Software development process / Common Criteria / Quality assurance / Software quality / Management / Business

Software Assurance: An Overview of Current Industry Best Practices February 2008

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:21
53Open Travel Alliance / Symantec / SAP AG / Intel / Siemens / Computer security / Nokia / Software / Software assurance / Technology / Business / Computing

Microsoft Word - Intel_Joins_SAFECode_FINAL.docx

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 15:56:20
54Standards / Software testing / Computer network security / National security / Professional certification / Software engineering / Software assurance / Penetration test / Software engineer / Security / Computer security / Cyberwarfare

Security Engineering Training A Framework for Corporate Training Programs on the Principles of Secure Software Development April 20, 2009 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:49
55Crime prevention / National security / Computer network security / Data security / Information security / Vulnerability / Password / Information security audit / Software security assurance / Security / Computer security / Cyberwarfare

What is Information Security? Information Security is simply the process of keeping information secure: protecting its availability, integrity, and privacy. Information has been valuable since the dawn of mankind: e.g.

Add to Reading List

Source URL: demop.com

Language: English - Date: 2007-11-14 09:08:46
56Quality assurance / Software assurance / Evaluation / Security / Computer security / Codenomicon / Software development process / Computer network security / Software quality / Software development

Media Contact: Stacy Simpson SAFECodeFOR IMMEDIATE RELEASE

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 15:56:11
57Archive formats / Portable software / WinRAR / RAR / WinZip / File archiver / Zip / Archive file / Software / Computing / Data compression

CERIAS Tech ReportThe Weakness of WinRAR Encrypted Archives to Compression Side-channel Attacks by Kristine Arthur-Durett Center for Education and Research Information Assurance and Security Purdue University, W

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-01-05 11:06:43
58Crime prevention / National security / Software quality / Computer network security / Threat model / Software security assurance / Vulnerability / Software development process / Software assurance / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-09-29 14:24:44
59Cyberwarfare / National security / Computer network security / Software testing / Application security / Information security / Software security assurance / Penetration test / E-learning / Security / Computer security / Crime prevention

2012-CBTEducation-Appsecure

Add to Reading List

Source URL: www.appsecure.com

Language: English - Date: 2012-03-07 22:36:34
60Computer network security / Multilevel security / Semiring / Vulnerability / Information flow / Software assurance / Threat / National Security Agency / Computer security / Security / Cyberwarfare

Multilevel Security and Quality of Protection Simon N. Foley1 , Stefano Bistarelli3,4 , Barry O’Sullivan1,2 , John Herbert1 , and Garret Swart5 1 Department of Computer Science, University College, Cork, Ireland.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-08-29 06:47:44
UPDATE