Software Development Security

Results: 957



#Item
271Education / ESET NOD32 / General Educational Development / ESET / Computing / Software testing / Antivirus software / Software

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report December 8, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-12-08 01:57:01
272Software testing / Educational psychology / Exercise / Sports science / Test / General Educational Development / Matousec / Education / Evaluation / Knowledge

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report April 1, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-04-01 12:50:02
273Education in the United States / General Educational Development / Software testing / Education / Education in Canada

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report September 21, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-09-21 09:22:59
274Red Hat Enterprise Linux / Virtualization / Security-Enhanced Linux / System software / Red Hat / Software

Red Hat Enterprise Linux6 Roadmap Tim Burke Vice President of Linux Platform Development, Red Hat June 14, 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-23 14:04:51
275Education in the United States / General Educational Development / Evaluation / Computer security / Antivirus software / Matousec / Software testing / Education / Education in Canada

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report June 17, 2013

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2013-08-29 12:06:18
276Software testing / Source code / Hacking / Vulnerability / Continuous integration / Software bug / Debian / Software quality / Quality assurance / Software development / Computing / Software

Source Code Analysis Made Easy The AppSec How-To Guide: Getting your Developers to Beg for Security Security is fascinating. It touches each and every one of us – whether we’re making an online credit card purchase,

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:11:04
277Actuarial science / Software testing / Ethics / Risk / Security / Test strategy / Software bug / Software development process / Risk management / Project management / Management / Business

Microsoft Word - SQA for New Things.doc

Add to Reading List

Source URL: www.satisfice.com

Language: English - Date: 2006-05-23 22:43:52
278Security / Information technology management / Evolutionary Process for Integrating COTS-Based Systems / Technology / Commercial off-the-shelf / Software development process / Business

Assessing the Risks of Commercial-Off-The Shelf Applications Lessons Learned from the Information Technology Resources Board

Add to Reading List

Source URL: govinfo.library.unt.edu

Language: English - Date: 2001-05-31 17:14:54
279Cross-platform software / Software architecture / Web development / Web application frameworks / CNR / Installation software / Datasource / JavaScript / Web application / Software / Computing / System software

CNR Security Web Service Explanation & Samples

Add to Reading List

Source URL: www.cizer.com

Language: English - Date: 2006-08-16 15:09:38
280Cyberwarfare / Common Criteria / Protection Profile / Evaluation Assurance Level / Vulnerability / Security Target / Change impact analysis / Software development process / Application security / Computer security / Evaluation / Security

Microsoft Word - SecEval-VisualPerspective1.doc

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-10 13:06:34
UPDATE