<--- Back to Details
First PageDocument Content
Crime prevention / National security / Software quality / Computer network security / Threat model / Software security assurance / Vulnerability / Software development process / Software assurance / Security / Computer security / Cyberwarfare
Date: 2011-02-08 15:36:32
Crime prevention
National security
Software quality
Computer network security
Threat model
Software security assurance
Vulnerability
Software development process
Software assurance
Security
Computer security
Cyberwarfare

Fundamental Practices for Secure Software Development

Add to Reading List

Source URL: www.safecode.org

Download Document from Source Website

File Size: 1,87 MB

Share Document on Facebook

Similar Documents

Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

DocID: 1qh9k - View Document

Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

DocID: 1q1im - View Document

Hacking / Computer security / Computer network security / Software testing / Vulnerability / Cross-site scripting / Application security / Threat model

Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

DocID: 1pySD - View Document

Computer security / Computer network security / Threat model / SQL injection / Web application security / Attack / Server / Threat / Database / HDIV / Cross-site scripting

Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

DocID: 1phIb - View Document

Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

DocID: 1oZA7 - View Document