Software Development Security

Results: 957



#Item
391Cross-platform software / Scripting languages / Software testing / High-level programming languages / Computer network security / Cross-site scripting / Vulnerability / Penetration test / Application security / Computing / Software engineering / Software

Exploring the Relationship Between Web Application Development Tools and Security Matthew Finifter University of California, Berkeley [removed]

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
392Project management / Actuarial science / Risk management / Security / Software development process / Identifying and Managing Project Risk / Management / Risk / Ethics

Microsoft Word - Report regarding risk breakout PMOC mtg 2011 r02

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2014-07-30 14:59:48
393Systems engineering / Software Engineering Institute / Reliability engineering / CISQ / Carnegie Mellon University / Vulnerability / Computer security / Software assurance / Carnegie Mellon Silicon Valley / Software quality / Software engineering / Software development

Predicting Software Assurance Using Quality and Reliability Measures

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2015-02-05 11:41:03
394Ethics / Risk management / Actuarial science / Security / Construction management / Software development process / Identifying and Managing Project Risk / Risk analysis / Management / Project management / Risk

US DOT Federal Transit Administration TPM-20 Office of Engineering Project Management Oversight Oversight Procedure 40 – Risk and Contingency Review _____________________________________________________________________

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2014-07-30 15:00:39
395Computing / CollabNet / Collaborative software / Software engineering / Application lifecycle management / Software development process / DevOps / Software deployment / Cloud computing / Software development / Software / Software project management

Accellion secure file transfer appliances provide the highest level of security and ease of use of any managed file transfer so

Add to Reading List

Source URL: www.collabnet.cn

Language: English - Date: 2014-10-17 10:04:58
396Actuarial science / Risk management / Security / Project management / Software development process / Management / Risk / Ethics

Risk-Based Monitoring Update – Volume I 1. Introduction TransCelerate’s Risk-Based Monitoring (RBM) project had a very productive year in[removed]Subsequent to publishing the Position Paper on Risk-Based Monitoring Met

Add to Reading List

Source URL: www.transceleratebiopharmainc.com

Language: English - Date: 2014-12-15 10:13:54
397Java enterprise platform / Oracle Fusion Middleware / Oracle WebLogic Server / Oracle Internet Directory / Oracle Application Server / Oracle Application Development Framework / Oracle Database / Oracle Corporation / Database audit / Software / Computing / Proprietary software

Oracle Fusion Middleware Security Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-01-27 11:49:34
398Portal software / Portlet / Oracle WebCenter / Oracle WebLogic Server / Web portal / Security Assertion Markup Language / Oracle Fusion Middleware / Oracle Application Development Framework / WebLogic / Computing / Software / Java enterprise platform

Oracle Fusion Middleware Federated Portals Guide for Oracle WebLogic Portal

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2013-05-31 17:11:46
399Metrology / Measurement / Security / Calibration / Software testing / Software development process / Traceability / Computer security / Software design / Software engineering / Technology / Science

University of Huddersfield Repository Parkinson, Simon, Longstaff, Andrew P., Crampton, Andrew, Allen, Gary, Fletcher, Simon and Myers, Alan The use of Cryptographic Principles within Metrology Software Original Citation

Add to Reading List

Source URL: eprints.hud.ac.uk

Language: English - Date: 2012-01-19 11:12:12
400Computer networking / Client–server model / Distributed computing architecture / Mobile software development / Computer network / Computer network security / Shared resource / Distributed computing / Home network / Computing / Technology / Electronics

1 INTRODUCTION Each of the past three centuries has been dominated by a single technology. The 18th century was the era of the great mechanical systems accompanying the Industrial Revolution. The 19th century was the age

Add to Reading List

Source URL: authors.phptr.com

Language: English - Date: 2002-08-15 11:31:11
UPDATE