Veracode

Results: 75



#Item
21Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Being Explicit about Security Weaknesses

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:31:33
22Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
23Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-03-02 12:21:16
24

VOLUME 2 State of Software Security Report The Intractable Problem of Insecure Software September 22, 2010

Add to Reading List

Source URL: www.veracode.com

- Date: 2014-02-06 15:28:52
    25

    VOLUME 2 State of Software Security Report The Intractable Problem of Insecure Software Executive Summary

    Add to Reading List

    Source URL: www.veracode.com

    Language: English - Date: 2014-02-06 15:28:51
      26

      VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011

      Add to Reading List

      Source URL: www.veracode.com

      Language: English - Date: 2014-02-06 15:28:53
        27

        VOLUME I State of Software Security Report The Intractable Problem of Insecure Software March 1, 2010

        Add to Reading List

        Source URL: www.veracode.com

        Language: English - Date: 2014-02-06 15:28:50
          28

          VOLUME 2 State of Software Security Report The Intractable Problem of Insecure Software September 22, 2010

          Add to Reading List

          Source URL: www.veracode.com

          Language: English - Date: 2014-02-06 15:28:52
            29

            KEY FEATURES The inventory of apps installed across all of your company’s managed devices is

            Add to Reading List

            Source URL: www.veracode.com

            Language: English - Date: 2015-05-19 15:37:42
              30

              VOLUME 4 State of Software Security Report The Intractable Problem of Insecure Software December 7, 2011

              Add to Reading List

              Source URL: www.veracode.com

              Language: English - Date: 2014-02-06 15:28:53
                UPDATE