Software Development Security

Results: 957



#Item
751Economy of Iran / Iran–United States relations / Politics of Iran / Agile software development / MKS Integrity / Software project management / Export / International Traffic in Arms Regulations / U.S. sanctions against Iran / Pakistani people / Asia / Science and technology in Pakistan

Institute for Science and International Security ISIS REPORT January 18, 2013 Case Study - Chinese Salesman Arrested in Pressure Transducer Case*

Add to Reading List

Source URL: www.isisnucleariran.org

Language: English - Date: 2013-04-15 12:28:03
752Solvency II Directive / Security / Management / Operational risk / Validation / IT risk / Software development process / Verification and validation / The IU / Pharmaceutical industry / Validity / Science

20121015_Pakiet PA wytyczne UKNF_en_7

Add to Reading List

Source URL: www.knf.gov.pl

Language: English - Date: 2012-10-25 07:47:05
753Software assurance / Software development / Computer science education / Security / Computer science / Computer security / Software engineer / Software Engineering Body of Knowledge / Software development process / Software engineering / Software quality / Quality assurance

Dr. Nancy R. Mead SEI T Two Initiatives for Disseminating

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-10-29 15:34:15
754Security / Supply chain management / Actuarial science / Risk / Risk management / Supply chain security / Software assurance / Computer security / Software development process / Business / Management / Technology

MITIGATING RISKS OF COUNTERFEIT AND TAINTED COMPONENTS Software and Supply Chain Risk Management Assurance Framework Don O’Neill, Independent Consultant

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:21
755HTML5 / Mobile application development / Python / Software development / Ext JS / Mobile device management / Mobile Web / Mobile operating system / Application software / Computing / Software / Ajax

1 Sencha Space Deploy your mobile web and HTML5 applications to any user on any device while protecting the security of your data and applications

Add to Reading List

Source URL: pages.sencha.com

Language: English - Date: 2014-08-25 08:47:23
756Marketing / Project management / Supply chain management / Security / Software development process / Risk management / Software development / Application software / Supply chain / Business / Technology / Management

MITIGATING RISKS OF COUNTERFEIT AND TAINTED COMPONENTS Malware, “Weakware,” and the Security of Software Supply Chains C. Warren Axelrod, Ph.D., Delta Risk

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:20
757Evaluation / Codenomicon / Oulu University Secure Programming Group / Robustness testing / Acceptance testing / Application security / Test automation / Software development process / Regression testing / Software testing / Software quality / Software development

© 2007. Codenomicon CODENOMICON BEST PRACTICES Making the Most Out of Your Robustness and Security

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2007-10-11 14:38:52
758Software development process / Information technology management / Software engineering / UML Partners / Agile software development / DevOps / Software deployment / IBM / Test automation / Software development / Software / Technology

Security considerations for DevOps adoption Michael Elder ([removed]) Senior Technical Staff Member IBM 01 June 2014

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2014-06-09 10:08:04
759Economy of Iran / Iran–United States relations / Politics of Iran / Agile software development / MKS Integrity / Software project management / Export / International Traffic in Arms Regulations / U.S. sanctions against Iran / Pakistani people / Asia / Science and technology in Pakistan

Institute for Science and International Security ISIS REPORT January 18, 2013 Case Study - Chinese Salesman Arrested in Pressure Transducer Case*

Add to Reading List

Source URL: isis-online.org

Language: English - Date: 2013-01-17 15:56:23
760Identification / Iris recognition / Privacy / Unique Identification Authority of India / Iris / Biometric points / BioAPI / Biometrics / Security / Surveillance

THE IMMUTABLE LAWS OF SOFTWARE DEVELOPMENT Collecting Large Biometric Datasets A Case Study in Applying Software

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-05-01 13:41:55
UPDATE