Software Development Security

Results: 957



#Item
171Computer security / Data security / Computing / Science / Information security / Document management system / Software development process / ISO 14000 / Cloud computing / Information technology management / Quality / Security

Quality, OHS, Environmental Management. Faster. Better. Smarter. In this economic climate, it’s more important than ever to manage compliance and risk efficiently and cost-effectively. Unfortunately, many organizations

Add to Reading List

Source URL: www.qudos-software.com

Language: English - Date: 2014-05-14 23:42:33
172Auditing / Audit trail / Security / Risk / Computing / Information technology audit process / Information technology audit / Computer security / Data security

Sample Language Describing Security Requirements Definition during the Business Process Analysis The following language is extracted from SSA’s Software Engineering Technology Manual sections related to the development

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
173Cyberwarfare / Software engineering / Vulnerability / Software development process / Science / IT risk management / Software testing / Computer security / Hacking

Sonatype Component Lifecycle Management KEY CAPABILITIES Build an effective secure software development lifecycle and avoid using vulnerable components from the start. CONTINUOUSLY AUTOMATE

Add to Reading List

Source URL: www.sonatype.com

Language: English
174Application lifecycle management / Computing / MKS Integrity / Software project management / Software / Perforce

Press Release For Immediate Release Perforce and Polarion Partner to Tighten Security of Intellectual Property across the Application Development Lifecycle

Add to Reading List

Source URL: www.polarion.com

Language: English - Date: 2014-09-25 03:34:20
175Software project management / Software development process / Project management / Agile42 / Valtech / Software development / Agile software development / Software

Measure. Optimize. Deliver. David Consulting Group Works with a Major Financial Self-Service, Security and Services Corporation to Assess its Agile Program and Provide Recommendations for Improvement

Add to Reading List

Source URL: www.davidconsultinggroup.com

Language: English - Date: 2015-02-25 14:52:13
176Multitier architecture / Oracle Database / Software / Computing / Oracle Corporation

PRESS RELEASE Des Powley joins Tier-3 as Vice President, Business Development Tier-3 Pty Ltd, a leading vendor of Security Information and Incident Management software and manufacturer of Huntsman® technology makes a st

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:38:10
177Software quality / Systems engineering / Computer network security / Software requirements / Reliability engineering / Survival analysis / Computer security / Vulnerability / Validation / Software development / Technology / Engineering

U.S. NUCLEAR REGULATORY COMMISSION Revision 2 JanuaryREGULATORY GUIDE

Add to Reading List

Source URL: www.nrc.gov

Language: English - Date: 2011-10-16 02:10:48
178Human development / Software testing / Data security / Vulnerability / Information security / Attachment theory / Threat / United States Agency for International Development / Computer security / Cyberwarfare / Security

Sensitive But Unclassified FINAL REPORT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
179Computer network security / Software testing / Data security / National security / Application security / Vulnerability / Information security management system / Software development process / Penetration test / Security / Computer security / Cyberwarfare

The State of Application Security A Research Study by Ponemon Institute LLC and Security Innovation The State of Application Security An Organizational Maturity study by

Add to Reading List

Source URL: www.securityinnovation.com

Language: English - Date: 2013-08-16 15:26:12
180Actuarial science / Project management / Security / Risk management / Software development process / Systems engineering process / IT risk management / Management / Risk / Ethics

Rule Development Process - Risk Management Methodology

Add to Reading List

Source URL: www.caa.govt.nz

Language: English - Date: 2010-07-22 20:09:31
UPDATE