Fortify Software

Results: 33



#Item
1Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
2Computer security / Computer network security / Application security / Software testing / Application firewall / Mobile security / Fortify Software / Vulnerability / Software as a service

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
3

Comprehensively Protect Your Mobile Applications with HP Fortify and Arxan Protecting Mobile, Embedded, and Packaged Software from Attacks As your applications are running in distributed or untrusted environments, they a

Add to Reading List

Source URL: www.arxan.co.jp

Language: English - Date: 2015-08-25 01:35:01
    4Fortify Software / Software quality / Vulnerability / Software testing / Computer security / Cyberwarfare

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:25
    5Software testing / Computer network security / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code injection / Fortify Software / JavaScript / Computer security / Cyberwarfare / Computing

    Iron Chef Black Hat Brian Chess, Jacob West Sean Fay, Toshinari Kureha {brian, jacob, sean, tkureha}@fortify.com August 2, 2007 Iron Chef Black Hat is a competition between two tool-building titans: Sean Fay and Toshi Ku

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    6Fortify Software / Software quality / Vulnerability / Software testing / Computer security / Cyberwarfare

    Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess / Jacob West Fortify Software

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:23
    7

    Encapsulation Hataları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET –Encapsulation (https://www.fortify.com/vulncat/en/vulncat/dotnet/Encap.html) Semih Gelişli, sgelisli-at-gmail-dot-com, 26 Eylü

    Add to Reading List

    Source URL: www.webguvenligi.org

    Language: Turkish - Date: 2011-10-13 07:08:58
      8

      Uygulama Programlama Arayüzü(API) İstismarları Fortify Taxonomy: Software Security Errors C# / VB.NET / ASP.NET – API Abuse (https://www.fortify.com/vulncat/en/vulncat/dotnet/APIA.html) Semih Gelişli, sgelisli-at-

      Add to Reading List

      Source URL: www.webguvenligi.org

      Language: Turkish - Date: 2011-08-22 17:44:46
        9Computer network security / Computing / Risk / Hacking / Vulnerability / Cross-site scripting / CVSS / Penetration test / Fortify Software / Cyberwarfare / Computer security / Software testing

        White paper HP 2012 Cyber Risk Report

        Add to Reading List

        Source URL: www.hpenterprisesecurity.com

        Language: English - Date: 2013-02-25 11:05:35
        10Software testing / Software bugs / Computer network security / Hacking / Coverity / Vulnerability / Application security / Social vulnerability / Fortify Software / Cyberwarfare / Computer security / Software quality

        Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract

        Add to Reading List

        Source URL: pages.cs.wisc.edu

        Language: English - Date: 2009-06-01 10:19:43
        UPDATE