Software Development Security

Results: 957



#Item
41Software development process / Maturity model / Capability Maturity Model / Information Security Forum / Informa / Capability / Computing / Information technology / Software

Time to Grow: Using maturity models to create and protect value

Add to Reading List

Source URL: www.securityforum.org

Language: English - Date: 2016-01-22 09:17:44
42Computing / Software engineering / Computer security / Web development / Internet privacy / Scripting languages / Hypertext Transfer Protocol / Computer network security / HTTP cookie / Cross-site scripting / Cross-site request forgery / Dynamic web page

WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
43Security / Computing / Information technology management / Information system / Computer security / Application software / Web development / Information technology consulting / ICDC College / Professional certification

WHAT CAN I DO WITH THIS DEGREE? COMPUTING & INFORMATION SYSTEMS (CIS) INTRODUCTION The College of Information Technology at University of Dubai offers a Bachelor Degree in Computing and Information Systems (CIS) that is

Add to Reading List

Source URL: www.ud.ac.ae

Language: English - Date: 2013-12-26 01:11:20
44Software development / Software / Extreme programming / Agile software development / Continuous integration / Git / Software testing / Computer security

Project 9 - ! Smarter Testing of Evolving Software Systems Leon Moonen, Thomas Rolfsnes, Stefano Di Alesio, Razieh Behjati

Add to Reading List

Source URL: certus-sfi.no

Language: English - Date: 2015-11-11 05:14:18
45Software development process / Agile software development / FishNet Security / DevOps / Fishnet / Copyright law of the United States / Information technology / Computing / Technology

DevOoops DevOps & Security Dec 14, 2015 Copyright © 2015 nVisium LLC · www.nvisium.com

Add to Reading List

Source URL: nvisium.com

Language: English - Date: 2015-12-17 16:41:44
46Technology / Computing / Software engineering / Formal methods / Medical technology / Software development process / Medical equipment / Systems engineering / Medical device / Life-critical system / IEC 62304 / Computer security

Trustworthy Medical Device Software Kevin Fu Assistant Professor University of Massachusetts Amherst Department of Computer Science

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2011-08-16 12:32:05
47Software testing / Business / Computing / Computer security / Codenomicon / Development testing / Vulnerability / Test automation / Software development / Quality

A Forrester Total Economic Impact™ Study Prepared For Codenomicon The Total Economic Impact Of Codenomicon’s Defensics Security Testing Suite Project Director: Michael Speyer July 2012

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
48Computing / Software engineering / Software / Web development / Functional languages / Web programming / Hacking / Web applications / JavaScript / Opa / Cross-site scripting / Cross-site request forgery

Dagstuhl SeminarWeb Application Security 29.03. – Executive Summary Dan Boneh1 , Ulfar Erlingsson2 , Martin Johns3 and Benjamin Livshits4 1

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2010-08-09 09:34:32
49Computing / Computer security / Software / Project management / Threat model / Business / Enterprise modelling / Software engineering / Process management / Threat / Software development / Business process modeling

Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:57
50

Secure Software Development Security is more than a product feature. Custom software from Casaba is secure by design and by default. Why is Custom Software More Secure with Casaba? Whether you intend to build your next s

Add to Reading List

Source URL: www.casaba.com

Language: English
    UPDATE