Threat model

Results: 162



#Item
21Threat Modeling Cloud Applications What You Don’t Know Will Hurt You Scott Matsumoto

Threat Modeling Cloud Applications What You Don’t Know Will Hurt You Scott Matsumoto

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:03:44
22Studying Climate Change  “…global climate change caused by human activities is occurring now, and it is a growing threat to society.” —American Association for the

Studying Climate Change “…global climate change caused by human activities is occurring now, and it is a growing threat to society.” —American Association for the

Add to Reading List

Source URL: meteorology.lyndonstate.edu

Language: English - Date: 2015-05-19 11:55:19
23Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:49
24Fundamental Practices for Secure Software Development A Guide to the Most Effective Secure Development Practices in Use Today OCTOBER 8, 2008 Editor Stacy Simpson, SAFECode

Fundamental Practices for Secure Software Development A Guide to the Most Effective Secure Development Practices in Use Today OCTOBER 8, 2008 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:40
25OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:26
26Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today

Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-09-29 14:24:44
27Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-04-02 06:08:19
28icipe Desmodium intercropping eliminates striga threat and improves food security in Africa Scientists at the International Centre of Insect Physiology and Ecology (icipe) in Kenya, in

icipe Desmodium intercropping eliminates striga threat and improves food security in Africa Scientists at the International Centre of Insect Physiology and Ecology (icipe) in Kenya, in

Add to Reading List

Source URL: www.push-pull.net

Language: English - Date: 2014-02-12 08:19:37
29Cigital SDL Case Study Outline – Insurance Vertical  Cigital, IncRidgetop Circle Suite 400 Dulles, VA

Cigital SDL Case Study Outline – Insurance Vertical Cigital, IncRidgetop Circle Suite 400 Dulles, VA

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:24
30Chronic traumatic encephalopathy: the dangers of getting

Chronic traumatic encephalopathy: the dangers of getting "dinged"

Add to Reading List

Source URL: www.springerplus.com

Language: English