<--- Back to Details
First PageDocument Content
Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series
Date: 2015-11-20 16:43:16
Computing
Prevention
Evaluation
Computer security
Security
Information technology management
Data security
IT risk management
Software assurance
Vulnerability
Application security
ISO/IEC 27000-series

Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

Add to Reading List

Source URL: www.safecode.org

Download Document from Source Website

File Size: 788,79 KB

Share Document on Facebook

Similar Documents

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

A2J Evaluation and Research Options  Process Evaluation Formative Assessment

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document