Software security assurance

Results: 433



#Item
81Software testing / LabVIEW / Software development process / Software design / Software architecture / Software development / Application software / Software security assurance / MIL-STD-498 / Software / Computing / Project management

PDF Document

Add to Reading List

Source URL: www.sal.wisc.edu

Language: English - Date: 2009-01-07 12:25:48
82Software quality / Data security / Crime prevention / National security / Software security assurance / SAP AG / Cigital / Information security management system / Software assurance / Security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:41
83Computing / Software testing / Evaluation / Cyberwarfare / Application security / Penetration test / Quality assurance / Software development process / Software quality / Computer network security / Computer security / Security

El Al Synopsis El Al, Israel’s national airline, selected Seeker as their application security testing solution to be part of existing software quality assurance processes. Seeker is routinely used by El Al for testing

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:52
84Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-01 06:45:15
85Symantec / Antivirus software / Threat / Malware / Information assurance / Lords of Dharmaraja / Huawei Symantec / Computer security / Computing / Cyberwarfare

Security policy An industry perspective

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:40:49
86Unix / Computer network security / Malware / File system / Computer file / Operating system / Device file / Privilege / Configuration file / Computing / Computer security / System software

Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2001 Detecting Insider Threats by Monitoring System Call Activity Nam Nguyen and Peter Reiher

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-10-29 13:27:33
87Security / Quality assurance / Software development process / Information security / UCAS / Science / Education / Higher Education South Africa / Higher education in the United Kingdom / Cheltenham / Higher Education Statistics Agency

Type CONFIDENTIAL if required

Add to Reading List

Source URL: www.hesa.ac.uk

Language: English - Date: 2015-03-17 12:38:32
88Software engineering / Neotys / Load testing / Reliability engineering / Quality assurance / Cloud testing / System testing / Software testing / Evaluation / Software quality

Neotys Selected to SD Times 100: Elements of Success Award Company Chosen as Leader in Mobile Testing, Quality Assurance and Security Category Waltham, Mass. – June 9, 2014 – Neotys, a leader in easy-to-use, load tes

Add to Reading List

Source URL: www.neotys.com

Language: English - Date: 2014-06-30 05:16:43
89Cyberwarfare / Privileged Identity Management / Cryptography / Lieberman Software / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Password / Security token / Security controls / Security / Computer security / Identity management

DIACAP Compliance Enterprise Random Password Manager Introduction Lieberman Software’s Privileged Identity Management solutions help federal government organizations comply with the DoD Information

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2011-06-28 11:24:58
90Veracode / Open-source software / Parasoft / Debian / Computer security / Software / Computing / Cloud computing

Software Assurance Marketplace (SWAMP) Team Designing, building, and operating the SWAMP is a joint effort of four research institutions: Morgridge Institute for Research (lead), Indiana University, University of Illinoi

Add to Reading List

Source URL: www.signup4.net

Language: English
UPDATE