Back to Results
First PageMeta Content
Crime prevention / National security / Software quality / Computer network security / Threat model / Software security assurance / Vulnerability / Software development process / Software assurance / Security / Computer security / Cyberwarfare


Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today
Add to Reading List

Document Date: 2014-09-29 14:24:44


Open Document

File Size: 1,90 MB

Share Result on Facebook

Company

Tools 47 Verification 34 CWE References 49 Resources / Verification 14 Introduction 2 Resources / Nokia / EMC Corporation / Elevation of Privilege / Formats 27 CWE References 27 Verification 28 Resources / Information Disclosure / References 5 Verification 17 Verification 5 Resources / Repudiation / References 49 Resources 35 Verification 49 Resources / Tampering / Symantec Corp. / Toolset 44 Verification 30 CWE References 45 Resources / Adobe Systems Inc. / Microsoft Corp. / References 20 Verification 8 Verification 20 Resources / MITRE Corp. / References 45 Resources 31 Verification 45 Resources / Juniper Networks / Spoofing / References 24 Verification 10 Verification 24 Resources / SAP AG / Denial of Service / Securing Software / /

Facility

Threat library / /

IndustryTerm

software integrity / software design / supply chain / communications technology industry / software vendors / software development lifecycle / software security practices / software security / software designers / database applications / Web Application Security Project / software developers / software assurance / software engineering practices / software product / software supply chain integrity / software development / software tual relationships / cloud-based and online services / Web Software Development Lifecycle / software weakness types / Distinct software / software / software weaknesses / secure software development / individual software security efforts / software industry / secure technology ecosystem / software integrity controls / software assurance programs / secure software / /

Organization

Excellence in Code / Data and Analysis Center for Software / Information Assurance Technology Analysis Center / /

Person

Michael Howard / Mikko Saario / Matt Coles / Threat Modeling / Kyle Randolph / Contents Foreword iv ii / Stacy Simpson / /

Position

Editor / development model / moving forward / Resources Moving Industry Forward / /

Product

Secure / Secure Software / /

ProgrammingLanguage

SQL / /

Technology

SSL / operating systems / pdf / mobile devices / Encryption / Cryptography / http / GUI / /

URL

http /

SocialTag