Software Development Security

Results: 957



#Item
61Human–computer interaction / Visual arts / Usability / Web development / Software architecture / User interface design / Telogis Inc. / User experience design / Web application / Design / Web design / Software development

CV for Nathanael Coyne Personal Details Name: Mr Nathanael Coyne (Boehm) Date of Birth: 18 July 1983 Citizenship: Australian Security Clearance: Lapsed

Add to Reading List

Source URL: www.purecaffeine.com

Language: English - Date: 2015-05-01 01:07:12
62Software development / Information technology audit / COBIT / Privacy / Standards / Corporate governance of information technology / Information security management system / Information Criteria / Capability Maturity Model / Information technology management / Information technology governance / Project management

Microsoft Word - asist124-camera.docx

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:54:36
63Graphics file formats / Animation software / Cross-platform software / Web development software / SWF / Malware / Vulnerability / ActionScript / Cross-site scripting / Software / Computing / Adobe Flash

Poster: Deep Learning for Zero-day Flash Malware Detection Wookhyun Jung Sangwon Kim

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:29
64Vulnerability / Evaluation / Penetration test / Security testing / Validation / Framework Programmes for Research and Technological Development / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:42:00
65Cross-platform software / Delphi programming language / Embarcadero Delphi / Pascal / Oracle Corporation / Borland / Microsoft Certified Professional / Turbo Pascal / Mono / Computing / Software / Computing platforms

571500Phillip H. Blanton Software Architect, Developer, Development Manager, Development Team-Lead, Principal Software Security Consultant, Hacker 00Phillip H. Blant

Add to Reading List

Source URL: phillipblanton.com

Language: English - Date: 2015-03-31 16:11:07
66Security / Penetration test / Model-based testing / Validation / Vulnerability / Model checking / Software development process / Security testing / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-13 08:46:57
67Security / Penetration test / Vulnerability / Security testing / Test automation / Framework Programmes for Research and Technological Development / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-02-10 06:15:57
68Technology / Business / Marketing / Product development / Software development / Software engineering / Software developer / Application security / Lead programmer / Computing / Software project management / Project management

571500Phillip H. Blanton Software Architect, Developer, Development Manager, Development Team-Lead, Principal Software Security Consultant, Hacker 00Phillip H. Blant

Add to Reading List

Source URL: phillipblanton.com

Language: English - Date: 2015-03-31 16:36:30
69Computing / Embedded Linux / Android / Cloud clients / Sandbox / Android software development / Rooting / Software / Smartphones / System software

Poster: Full-fledged App Sandboxing for Stock Android Michael Backes CISPA, Saarland University & MPI-SWS

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:44
70Software / Embedded Linux / Mobile application development / Python / Software development / Android / Privacy / Internet privacy / Computing / Smartphones / Cloud computing

Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud Yue Duan Mu Zhang Heng Yin Yuzhe Tang

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:42
UPDATE