Veracode

Results: 75



#Item
51Adobe software / ColdFusion / Veracode / Macromedia JRun / Adobe Flex / OWASP / Macromedia / Computing / Software / Web development software

Deconstructing ColdFusion Chris Eng and Brandon Creighton Veracode, Inc. Hi

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:33
52Espionage / Veracode / Backdoor / Rootkit / Computer worm / Chris Wysopal / Spyware / InterBase / Extended Copy Protection / System software / Software / Malware

Detecting "Certified Pre-owned" Software and Devices Chris Wysopal April 17, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
53

Veracode Next Generation Dynamic Scanning

Add to Reading List

Source URL: software-security.sans.org

- Date: 2012-08-27 18:45:03
    54OWASP / Software / Veracode / Mobile apps / Mobile payment / Mobile operating system / Computing / Security / Computer security

    OWASP Goes Mobile SANS AppSec Summit 2011 Mike Zusman[removed]

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 18:45:03
    55

    Veracode Next Generation Dynamic Scanning

    Add to Reading List

    Source URL: software-security.sans.org

    - Date: 2012-08-27 18:45:03
      56L0pht / Wellness / Application security / Chris Wysopal / Software / Cloud computing / Veracode / Computing

      FOR IMMEDIATE RELEASE Wellness & Prevention, Inc. Wins Veracode 2012 Secure Development Award Ann Arbor, MI – October 16, 2012 – Wellness & Prevention, Inc., a Johnson & Johnson company, was recently named one of th

      Add to Reading List

      Source URL: www.wellnessandpreventioninc.com

      Language: English - Date: 2014-09-29 06:57:44
      57Software testing / Program analysis / Fault injection / Veracode / Application security / Code review / Programming tool / Compiler / Static program analysis / Software / Computing / Software review

      Microsoft Word - NAVSEA-Tools-Paper[removed]doc

      Add to Reading List

      Source URL: samate.nist.gov

      Language: English - Date: 2013-05-07 16:54:57
      58Data security / Cloud computing / Information security / National security / Application firewall / Software quality / Vulnerability / Veracode / Threat model / Computer security / Computing / Security

      White Paper Appropriate Software Security Control Types for Third Party Service and Product Providers White Paper Third Party Software Security Working Group

      Add to Reading List

      Source URL: docs.ismgcorp.com

      Language: English - Date: 2013-11-19 12:35:10
      59Program analysis / LDRA Testbed / Coverity / Veracode / Klocwork / Vulnerability / SofCheck Inspector / Static program analysis / GrammaTech / Software / Computing / Software testing

      Special Publication[removed]The Second Static Analysis Tool Exposition (SATE[removed]Vadim Okun

      Add to Reading List

      Source URL: samate.nist.gov

      Language: English - Date: 2013-05-07 16:54:57
      60Stakeholder / Application security / .mobi / United States Department of Homeland Security / Computing / Public safety / Software / Computer security / Cloud computing / Veracode

      Public  Safety  Communications  Research  Program   Panel on Security Risks in Mobile Application for Public Safety Nelson Hastings Public Safety Communications Research Computer Security Division

      Add to Reading List

      Source URL: www.pscr.gov

      Language: English - Date: 2014-06-02 16:34:36
      UPDATE