Cigital

Results: 66



#Item
41Attack Trends Editors: David Ahmad, [removed] Iván Arce, [removed] Online Games and Security

Attack Trends Editors: David Ahmad, [removed] Iván Arce, [removed] Online Games and Security

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
42S OFTWARE R ISK M ANAGEMENT T HE I MPORTANCE INTO THE

S OFTWARE R ISK M ANAGEMENT T HE I MPORTANCE INTO THE

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
43CHAPTER III: SEPARATING THREAT FROM THE HYPE: WHAT WASHINGTON NEEDS TO KNOW ABOUT CYBER SECURITY By Gary McGraw and Nathaniel Fick

CHAPTER III: SEPARATING THREAT FROM THE HYPE: WHAT WASHINGTON NEEDS TO KNOW ABOUT CYBER SECURITY By Gary McGraw and Nathaniel Fick

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:30
44Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Essential Factors for Successful Software

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Essential Factors for Successful Software

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
45Microsoft Word - FINAL3-Abridged synopsis.doc

Microsoft Word - FINAL3-Abridged synopsis.doc

Add to Reading List

Source URL: www.ferc.gov

Language: English - Date: 2009-11-19 12:18:02
46Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
47ID THEFTS  Design Flaws in IP Surveillance Cameras Exploiting Web Interfaces IP surveillance cameras are used extensively for monitoring of live

ID THEFTS Design Flaws in IP Surveillance Cameras Exploiting Web Interfaces IP surveillance cameras are used extensively for monitoring of live

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:32
48User Authentication on Mobile Devices Amit Sethi Technical Manager Omair Manzoor Senior Security Consultant

User Authentication on Mobile Devices Amit Sethi Technical Manager Omair Manzoor Senior Security Consultant

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:56
49The Importance of Reliable Randomness A Note on Random Number Generation and Combinatorial Sampling Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

The Importance of Reliable Randomness A Note on Random Number Generation and Combinatorial Sampling Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
50Software Design Misuse and Abuse Cases Getting Past the Positive Paco Hope Gary McGraw, Ph.D.

Software Design Misuse and Abuse Cases Getting Past the Positive Paco Hope Gary McGraw, Ph.D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05