<--- Back to Details
First PageDocument Content
Business / Software project management / Threat model / Agile software development / Scrum / Software development process / Application security / Requirement / Specification and Description Language / Software development / Computer security / Technology
Date: 2014-12-16 19:06:25
Business
Software project management
Threat model
Agile software development
Scrum
Software development process
Application security
Requirement
Specification and Description Language
Software development
Computer security
Technology

Microsoft Word - SDL-Agile.docx

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 271,52 KB

Share Document on Facebook

Similar Documents

Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

DocID: 1qh9k - View Document

Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

DocID: 1q1im - View Document

Hacking / Computer security / Computer network security / Software testing / Vulnerability / Cross-site scripting / Application security / Threat model

Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

DocID: 1pySD - View Document

Computer security / Computer network security / Threat model / SQL injection / Web application security / Attack / Server / Threat / Database / HDIV / Cross-site scripting

Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

DocID: 1phIb - View Document

Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

DocID: 1oZA7 - View Document