software security

Results: 17991



#Item
781Software quality / Design for X / Symposium on Principles of Programming Languages / Reliability engineering / Computer security / Software / Fly-by-wire

Verified squared: does critical software deserve verified tools? Xavier Leroy INRIA Paris-Rocquencourt POPL 2011

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2011-02-02 12:03:33
782Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
783Software testing / Program analysis / Software review / Concurrent programming languages / Cross-platform software / Static program analysis / Dynamic program analysis / Programming tool / Lint / Application security / Software quality / Java

http://www.stickyminds.com/BetterSoftware/magazine.asp?fn=cifea

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-06-20 15:01:26
784Antivirus software / Malwarebytes / Malware / Avira / Intel Security / IObit

C A S E S T U DY Sagicor takes on malware and wins Malwarebytes Endpoint Security solution enables global financial services company to dramatically reduce malware infections, remediation time, and administration Busine

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-17 18:02:58
785Antivirus software / Malwarebytes / Malware / Intel Security / Ransomware / Avira / IObit

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
786Software testing / Extreme programming / Continuous integration / Vulnerability / Regression testing / Code coverage / Software quality / Unit testing / Dynamic program analysis

Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Security vulnerabilities are cau

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-07-20 16:45:50
787Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
788Webmail / Calendaring software / Personal information managers / Password / Security / Login / Outlook.com / Outlook on the web / Mail / Self-service password reset / Password notification email

Logging in for the First Time  Page 1 E-MAIL Outlook Web App (OWA) is similar to Outlook 2013 in functionality and use. However, OWA mailboxes

Add to Reading List

Source URL: isc365-public.sharepoint.com

Language: English - Date: 2014-02-03 14:30:19
789Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / IObit / SentinelOne

DATA S H E E T Malwarebytes Endpoint Security Advanced threat prevention Malwarebytes Endpoint Security is an endpoint protection platform

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-17 18:03:01
790Cryptography / Crime prevention / Information governance / National security / Data security / Common Criteria / Electronic voting / Information security / Computer security

Inside Risks Rebecca Mercuri Uncommon Criteria he software development process can benefit from the use of established standards and procedures to assess compliance with specified

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:30:03
UPDATE