Software Development Security

Results: 957



#Item
301Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:32:39
302Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:32:39
303Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:17:06
304Cloud standards / Software architecture / Web 2.0 / Cross-site scripting / Ajax / JavaScript / Web application / Atom / Web threat / Computing / World Wide Web / Web development

WEB 2.0 AND SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:19
305Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: www.immerundewig.at

Language: English - Date: 2012-01-30 19:46:28
306Theoretical computer science / Logic in computer science / Specification language / Z notation / Computer security / Formal specification / Specification / HOL / Functional specification / Software development / Formal methods / Computing

Methods and Tools for the Verification of Critical Properties Roger Bishop Jones International Computers Limited, Eskdale Road, Winnersh, Berks, England, RG11 5TT. Phone: +[removed], E-mail: [removed]

Add to Reading List

Source URL: www.lemma-one.com

Language: English - Date: 2004-04-12 08:34:15
307Education in the United States / General Educational Development / Antivirus software / Software / Evaluation / Matousec / Software testing / Education / Education in Canada

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report April 1, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-04-01 12:49:18
308Cyberwarfare / Software development / Security / Misuse case / Computer security / Evaluation / Vulnerability

Explanatory note on potential misuse of research The aim of this note is to help applicants, evaluators and EC staff members to identify and address potential misuse of research. Although the risk of potential misuse can

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-03-10 05:26:32
309Software testing / Educational psychology / Exercise / Sports science / Test / General Educational Development / Matousec / Education / Evaluation / Knowledge

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report September 21, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-09-21 09:25:04
310Computer appliance / Computer networking / Manufacturing / Science / Appliance / Prototype / Software development process / Data warehouse appliance / Virtual appliance / Technology / Business / Automation

Benefits of a Custom Designed, Built, and Manufactured Computer Appliance Dedicated computer appliances have become a common delivery platform for medical, security, surveillance, communication, and storage software appl

Add to Reading List

Source URL: www.mce.com

Language: English
UPDATE