Software Development Security

Results: 957



#Item
191Global Monitoring for Environment and Security / Space policy of the European Union / Requirement / Systems engineering process / New product development / Project management / Technology / Science / Creativity / Systems engineering / Software requirements / European Space Agency

DOCX Document

Add to Reading List

Source URL: due.esrin.esa.int

Language: English - Date: 2012-09-17 07:14:58
192Software / Unit testing / Test automation / Test harness / Security testing / Acceptance testing / Software testing / Software development / Evaluation

Automating Security Testing

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:31
193Security / Hewlett-Packard / PHP / Computing / Software / Prevention

Department of Environment and Natural Resources Ecosystems Research and Development Bureau ========================================================================================== NOTICE OF AWARD

Add to Reading List

Source URL: erdb.denr.gov.ph

Language: English - Date: 2014-08-28 22:07:02
194WebDev / WinDev / Value added tax / Email / Internet / Integrated development environments / Computing / Web development software

For over 25 years, millions of applications developed with PC SOFT tools have been distributed all over the world, in all fields : choosing PC SOFT is choosing security. And these applications were developed 3 to 10 time

Add to Reading List

Source URL: www.windev.com

Language: English - Date: 2015-03-16 12:15:49
195Template engines / Web application frameworks / Web development / Web applications / Web developer / Web application development / Mailto / CakePHP / Web application security / Software / Computing / World Wide Web

Downloaded from _http://dash.za.net_/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixin

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:16:02
196World Wide Web / Web applications / Web application frameworks / Template engines / Software architecture / Web developer / Web application development / CakePHP / Web application / Software / Computing / Web development

Downloaded from http://dash.za.net/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixing

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:32:52
197Systems science / Design / Systems engineering process / Requirement / Functional requirement / Reliability engineering / Information security / Data architecture / Systems engineering / Software development / Software requirements

Strategic Information Systems Planning This chapter is keyed to the components shown in Figures 23 and 24. The starting point is to have a complete high-level overview of information requirements through strategic inform

Add to Reading List

Source URL: www.archimuse.com

Language: English - Date: 2011-09-09 18:19:19
198Ethics / Management / Security / Risk management / Value at risk / Software development process / Actuarial science / Risk / Financial risk

This is the author’s version of a work that was submitted/accepted for publication in the following source: Conforti, Raffaele, La Rosa, Marcello, Fortino, Giancarlo, ter Hofstede, Arthur H.M., Recker, Jan C., & Adams,

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2014-12-01 04:36:49
199Software development / Hacking / Vulnerability / Semantic Web / Software development methodology / Computer security / Software testing / Cyberwarfare

Semantic Web Methodology Semantic Web Methodolgy  Steps for a Semantic Web Methodology

Add to Reading List

Source URL: scap.nist.gov

Language: English
200Software development / Usability / Anticipatory thinking / Ambient intelligence / Critical infrastructure / Transition scenario / Time / Scenario planning / Infrastructure / United States Department of Homeland Security / Scenario

Microsoft Word - D 4 5_afterReview

Add to Reading List

Source URL: ettis-project.eu

Language: English - Date: 2013-10-02 01:23:00
UPDATE