Veracode

Results: 75



#Item
61Software testing / Hacking / Computer network security / Cloud computing / Veracode / Vulnerability / CWE / Software quality / Buffer overflow / Computing / Software engineering / Computer security

Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
62Computer security / Data security / Credit cards / Data privacy / Symantec / Payment Card Industry Data Security Standard / Veracode / Information security / Data center / Computing / Business / Security

Symantec Control Compliance Suite Vendor Risk Manager Continuously Assess and Secure Your Information Supply Chain. Data Sheet: Security Management CCS Vendor Risk Manager

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-04-23 05:33:56
63Software testing / Computer network security / Cloud computing / Veracode / Hacking / Application security / Vulnerability / Software assurance / Computer insecurity / Computer security / Computing / Cyberwarfare

Veracode Input for Developing a Framework to Improve Critical Infrastructure Cybersecurity Background Veracode provides automated and manual application security testing for over 300 organizations in the US and abroad. O

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-08 14:08:49
64Computer network security / CVSS / Mitre Corporation / Vulnerability / Veracode / Computer security / Cyberwarfare / Computing

Common Weakness Scoring System (CWSS) Steve Christey September 27, [removed]removed]

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
65Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-02 20:33:49
66Software testing / Hacking / Computer network security / Cloud computing / Veracode / Vulnerability / CWE / Software quality / Buffer overflow / Computing / Software engineering / Computer security

Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53
67Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
68Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare

Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-03-02 12:21:16
69Software testing / Software quality / Computer network security / Hacking / Software assurance / Vulnerability / Veracode / Software security assurance / CWE / Computer security / Cyberwarfare / Computing

A Status Update: The Common Weaknesses Enumeration Robert A. Martin Sean Barnum MITRE Corporation

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-14 16:17:05
70Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Being Explicit about Security Weaknesses

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:31:33
UPDATE