Threat model

Results: 162



#Item
21Threat model / Cloud computing / Proprietary software / Threat / Asset / Platform as a service / Security / Computer security / Computing / Cyberwarfare

Threat Modeling Cloud Applications What You Don’t Know Will Hurt You Scott Matsumoto

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:03:44
22Global warming / Climate history / Intergovernmental Panel on Climate Change / Climate model / Scientific opinion on climate change / Global warming controversy / Climate change / Atmospheric sciences / Environment

Studying Climate Change “…global climate change caused by human activities is occurring now, and it is a growing threat to society.” —American Association for the

Add to Reading List

Source URL: meteorology.lyndonstate.edu

Language: English - Date: 2015-05-19 11:55:19
23Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:49
24Computing / Crime prevention / National security / Software quality / Software security assurance / Vulnerability / Software assurance / Threat model / Application security / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development A Guide to the Most Effective Secure Development Practices in Use Today OCTOBER 8, 2008 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:40
25Computing / Security / OWASP / Software testing / Penetration test / Application security / Web application security / Cross-site scripting / Threat model / Computer security / Cyberwarfare / Computer network security

OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:26
26Crime prevention / National security / Software quality / Computer network security / Threat model / Software security assurance / Vulnerability / Software development process / Software assurance / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-09-29 14:24:44
27Security Content Automation Protocol / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Adobe Flash / Adobe Acrobat / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Metadata / Software / Computing / Computer security

Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-04-02 06:08:19
28Parasitic plants / Land management / Invasive plant species / Striga / Model organisms / Tropical agriculture / Desmodium / Push–pull technology / Intercropping / Agriculture / Biology / Orobanchaceae

icipe Desmodium intercropping eliminates striga threat and improves food security in Africa Scientists at the International Centre of Insect Physiology and Ecology (icipe) in Kenya, in

Add to Reading List

Source URL: www.push-pull.net

Language: English - Date: 2014-02-12 08:19:37
29Software testing / Computer network security / Crime prevention / National security / Application security / Threat model / Penetration test / Information security / Vulnerability / Computer security / Security / Cyberwarfare

Cigital SDL Case Study Outline – Insurance Vertical Cigital, IncRidgetop Circle Suite 400 Dulles, VA

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:24
30Management / Risk management / Actuarial science / Threat model / Risk assessment / Security testing / Information security / Software testing / Threat / Computer security / Risk / Security

Chronic traumatic encephalopathy: the dangers of getting "dinged"

Add to Reading List

Source URL: www.springerplus.com

Language: English
UPDATE