Software Development Security

Results: 957



#Item
1Software Development, Intellectual Property Rights, and IT Security∗ Dipl.–Inform. Robert A. Gehring†

Software Development, Intellectual Property Rights, and IT Security∗ Dipl.–Inform. Robert A. Gehring†

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:16:40
    2Sixth International Symposium on Tunnel Safety and Security, Marseille, France, March 12-14, 2014  Development of tunnel simulation software aiming at optimization of tunnel control operations Evangelos Krokos1 & Matthia

    Sixth International Symposium on Tunnel Safety and Security, Marseille, France, March 12-14, 2014 Development of tunnel simulation software aiming at optimization of tunnel control operations Evangelos Krokos1 & Matthia

    Add to Reading List

    Source URL: www.hbi.ch

    - Date: 2014-11-17 08:34:58
      3Hack & Fix 
  Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Hack & Fix 
 Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

      Add to Reading List

      Source URL: www.petefreitag.com

      Language: English - Date: 2015-11-12 15:17:53
      4Microsoft Word - review18.doc

      Microsoft Word - review18.doc

      Add to Reading List

      Source URL: www.jot.fm

      Language: English - Date: 2007-08-10 10:58:07
      5Logging into ARCHIBUS Web Central Log In ScreenOpen your Internet 

      Logging into ARCHIBUS Web Central Log In ScreenOpen your Internet 

      Add to Reading List

      Source URL: facserv.utk.tennessee.edu

      Language: English - Date: 2014-08-04 09:36:13
      6IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

      IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

      Add to Reading List

      Source URL: www.tsc.com

      Language: English - Date: 2015-10-14 13:33:57
      7#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

      #1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

      Add to Reading List

      Source URL: prevoty.com

      Language: English - Date: 2016-08-18 22:09:36
      8Case Study | Security/Technology | Cloud Automation & Management  SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

      Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

      Add to Reading List

      Source URL: www.kovarus.com

      Language: English - Date: 2016-07-11 19:38:57
      9Arxan Best Practices White Paper  7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

      Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

      Add to Reading List

      Source URL: www.arxan.com

      Language: English - Date: 2016-08-01 23:51:09
      10Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

      Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

      Add to Reading List

      Source URL: www.safecode.org

      Language: English - Date: 2015-11-20 16:43:16