Back to Results
First PageMeta Content
Actuarial science / Data security / Crime prevention / National security / Information security / Vulnerability / Internal control / Value at risk / Computer security / Security / Public safety / Risk


CHAPTER 25 Managing the Development of Secure Systems My own experience is that developers with a clean, expressive set of specific security
Add to Reading List

Document Date: 2011-12-05 05:55:02


Open Document

File Size: 494,56 KB

Share Result on Facebook

Company

IBM / CVs / Needham / Sarbanes-Oxley / Methodology Software / Enron / /

Country

United States / United Kingdom / South Africa / /

Currency

USD / /

Event

Bankruptcy / /

Facility

Mission Control Center / Great Pyramid / /

IndustryTerm

finance department / casualty services / security applications / electricity / fielded smartcard systems / energy getting vengeance / offensive systems / a lot of different applications / intrusion detection systems / control systems / alarm systems / software crisis / Risk management / software quality / bank fraud / risk reduction systems / finance / retail chain / Bank managers / car park / /

Organization

U.S. Air Force / U.S. government / National Aeronautics and Space Administration / Mission Control Center in Houston / Department of Defense / /

Person

James Coyne / John Adams / Normal Kluksdahl / /

Position

head for the car park / competent IT security manager / organizational driver / CEO / IT director / guard / security consultant / security engineer / responsible manager / project manager / director the finance / generalist consultant / consultant / working IT manager / security manager / /

SocialTag