Software Development Security

Results: 957



#Item
221Mathematical software / Formal verification / KeY / ARM architecture / Model checking / Computer security / ACL2 / Software development process / Logic simulation / Electronic engineering / Theoretical computer science / Formal methods

PART 2: Proposed Research and Yu formally described a substantial subset of the Motorola MC68020 processor in the logic of the Boyer-Moore prover and used the resulting model to verify compiler generated object code for

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2004-06-02 11:31:35
222Rapid7 / Software / System software / Free software

Strategic Services Program Development Take control of your organization’s security with help from the experts helps transform your organization’s Get program guidance developed to align with security program to be r

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-09-10 13:11:07
223Webroot Software / Malware / Android / Mobile apps / Mobile application development / Webroot Internet Security Complete / Computing / Smartphones / Software

Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-03-27 18:27:09
224Cyberwarfare / Incident management / Disaster preparedness / Rapid7 / Incident response team / Emergency management / Attack / Threat / Computer security / Software / Computer network security

Plan your threat detection and response For security teams looking to increase their preparedness, Incident Response Program Development helps an organization to be more proficient at threat detection and increase readin

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-02-28 14:46:15
225Internet censorship / Privacy / Content filtering / Digital media / Technology / Computing / Internet / ICT Development Index / Internet censorship by country / Content-control software / Spam filtering / Computer network security

Part II Country Profiles and Regional Overview Introduction to the Country Profiles The country profiles that follow offer a synopsis of the findings and conclusions of OpenNet Initiative (ONI) research into the facto

Add to Reading List

Source URL: access.opennet.net

Language: English - Date: 2011-12-09 11:51:20
226Administration / Accountability / Science / Records management / Electronic document and records management system / Data security / Management system / Software development process / Project management / Content management systems / Information technology management / Business

National Archives of Australia Implementing an EDRMS: Checklist

Add to Reading List

Source URL: naa.gov.au

Language: English - Date: 2015-03-26 18:55:50
227Crime prevention / National security / Aspect-oriented software development / Vulnerability / Security / Cyberwarfare / Computer security

3rd Issue of the INTER-TRUST Newsletter Results of INTER-TRUST project are being validated using two completely different case studies with complex, high-demand and critical services, e-voting and Intelligent Transport S

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-10-06 09:19:25
228Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Configuration file / BIND / Internet / Internet protocols / Domain name system

SOFTWARE USER MANUAL (SUM): TRAINING, PROCEDURAL, AND DEVELOPMENT DOCUMENTATION DNSSEC-Tools Software User Manual Manual Pages

Add to Reading List

Source URL: www.dnssec-tools.org

Language: English - Date: 2014-09-18 01:15:15
229Telecommunications / Computer security / TRAC / Aspect-oriented software development / Computing / Business / Secure communication / Security / Interoperability

Interoperable Trust Assurance Infrastructure Objective Develop a dynamic and scalable framework to support trustworthy services and applications in heterogeneous networks and devices, based on the enforcement of interope

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-05-24 12:51:56
230Aspect-oriented programming / Crime prevention / National security / Computer security / Aspect-oriented software development / Spring Framework / Information security / Vulnerability / InterTrust Technologies / Software development / Security / Computing

2nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-04-01 03:12:26
UPDATE