Cigital

Results: 66



#Item
51Smart cards / Computing platforms / Java programming language / Java Card / Java / Applet / Card reader / GlobalPlatform / Java applet / Computing / Java platform / Cross-platform software

Java Security For Smart Cards Managing Smart Card Security Risks Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
52Cyberwarfare / Software engineering / Software licenses / Source code / Application security / Computer security / Vulnerability / Software development process / Proprietary software / Computing / Software testing / Computer network security

Microsoft Word - CIGITAL_WPC4_TEMPLATE.DOC

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
53Agile software development / Test automation / Test harness / Unit testing / Continuous integration / Acceptance testing / Software testing / Software development / Software

Software Assurance Agile Testing[removed]Ridgetop Circle, Suite 400 ● Dulles, Virginia 20166 ● [removed] ● [removed] ● www.cigital.com 2

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
54Software testing / Credit cards / Data privacy / Penetration test / Information security / Payment Card Industry Data Security Standard / Software quality / Security awareness / Quality assurance / Computer security / Security / Computing

Training: the secret to ongoing compliance by Sammy Migues, Director, Knowledge Management and Training July 24, 2007 Ongoing compliance requires ongoing training Hundreds of thousands of companies around the

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
55Quality control / Test harness / Test automation / Unit testing / Test plan / Test strategy / Graphical user interface testing / Manual testing / Automation / Software testing / Software quality / Quality assurance

Software Assurance Test Automation[removed]Ridgetop Circle, Suite 400 ● Dulles, Virginia 20166 ● [removed] ● [removed] ● www.cigital.com 2

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
56JavaServer Faces / Java specification requests / Java platform / Apache MyFaces / Java Platform /  Enterprise Edition / ASP.NET / Java Servlet / Padding oracle attack / Jspx-bay / Computing / Web application frameworks / Java enterprise platform

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
57Public key infrastructure / Digital signature / Password / Key / Man-in-the-middle attack / Cryptanalysis / NTRU / Index of cryptography articles / Web of trust / Cryptography / Key management / Public-key cryptography

The Future of Cryptography Practice and Theory Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
58Software testing / Software review / Computer network security / Source code / Application security / Computer security / Coverity / Vulnerability / Code review / Software quality / Computing / Software engineering

H O W T H I N G S W O R K Automated Code Review Tools for Security Gary McGraw, Cigital

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:34
59Software quality / Software licenses / Formal methods / Software project management / Project management / Software testing / Software development process / Software engineering / Reliability engineering / Software development / Computing / Software

Making Essential Software Work Why Software Quality Management Makes Good Business Sense Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
60Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Wireless Security’s Future Bruce Potter Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
UPDATE