Software Development Security

Results: 957



#Item
1

Software Development, Intellectual Property Rights, and IT Security∗ Dipl.–Inform. Robert A. Gehring†

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:16:40
    2

    Sixth International Symposium on Tunnel Safety and Security, Marseille, France, March 12-14, 2014 Development of tunnel simulation software aiming at optimization of tunnel control operations Evangelos Krokos1 & Matthia

    Add to Reading List

    Source URL: www.hbi.ch

    - Date: 2014-11-17 08:34:58
      3Software / Computing / Computer security / Web development software / Computer network security / Adobe software / Adobe ColdFusion / System administration / OWASP / SQL injection / Zap / Sudo

      Hack & Fix 
 Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Add to Reading List

      Source URL: www.petefreitag.com

      Language: English - Date: 2015-11-12 15:17:53
      4Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

      Microsoft Word - review18.doc

      Add to Reading List

      Source URL: www.jot.fm

      Language: English - Date: 2007-08-10 10:58:07
      5User interface techniques / Password / Security / Form / Software / Web development / Computing

      Logging into ARCHIBUS Web Central Log In ScreenOpen your Internet 

      Add to Reading List

      Source URL: facserv.utk.tennessee.edu

      Language: English - Date: 2014-08-04 09:36:13
      6Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

      IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

      Add to Reading List

      Source URL: www.tsc.com

      Language: English - Date: 2015-10-14 13:33:57
      7Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

      #1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

      Add to Reading List

      Source URL: prevoty.com

      Language: English - Date: 2016-08-18 22:09:36
      8Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

      Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

      Add to Reading List

      Source URL: www.kovarus.com

      Language: English - Date: 2016-07-11 19:38:57
      9Computing / Security / Computer security / Computer network security / Application security / Data center / Arxan Technologies / Software Development Security

      Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

      Add to Reading List

      Source URL: www.arxan.com

      Language: English - Date: 2016-08-01 23:51:09
      10Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

      Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

      Add to Reading List

      Source URL: www.safecode.org

      Language: English - Date: 2015-11-20 16:43:16
      UPDATE