Back to Results
First PageMeta Content
Software quality / Software testing / Computer network security / National security / Software security assurance / Vulnerability / Threat model / Penetration test / Information security / Computer security / Security / Cyberwarfare


ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Using Concept Maps to Introduce Software Security Assurance Cases
Add to Reading List

Document Date: 2014-09-01 19:29:33


Open Document

File Size: 987,06 KB

Share Result on Facebook

City

Boston / Melbourne / /

Company

Cambridge University Press / Comnet Marketing Group / Northrop Grumman / Northrop Grumman Aerospace Systems / Senior Systems / Federal Information Systems / MySQL / /

Country

United States / /

/

Event

Person Communication and Meetings / /

Facility

University of West Florida John Coffey / Building Security In. / University of West Florida / University of West Florida Chris Terry / University of West Florida Norman Wilde / National Institute of Standards and Technology / University of West Florida Thomas Reichherzer / University of West Florida Foundation / Hendrix College / The University of Colorado / University of Arkansas / Indiana University / /

IndustryTerm

software system / lightweight software security best practice activities / software development process / software development processes / software development lifecycle / real time / software developers / burdened software development process / software security assurance case practices / software development / software structure / software artifacts / Technology arguments / software engineering student / organizations software security requirements / software intensive systems / Apache web server log / software engineering process / secure software / Software security assurance cases / software security / data mining / software systems / education technology / software information assurance / software security vulnerabilities / software security assurance case / open-source applications / potential software vulnerabilities / software vulnerabilities / excellent communication tool / web services / /

MusicGroup

Ph.D. / /

Organization

Cambridge University / World Health Organization / U.S. Department of Commerce / West Florida Foundation / Indiana University / Computer Science Department / U.S. Department of Defense / National Institute of Standards and Technology / Security and Software Engineering Research Center / Northrop Grumman Aerospace Systems Software Products / Nystul Eminent Scholar Endowment / MIT / University of Arkansas / University of West Florida / Hendrix College / Institute for Human and Machine Cognition / University of Colorado / Colorado Springs / UWF Computer Science Department / U.S. DoD / /

Person

Allison Heinen / Sarah Pramanik / Addison Wesley / Thomas Reichherzer / Heather Dennison / Norman Wilde / Dallas Snider / Chris Terry / John Coffey / /

/

Position

expert and knowledge engineer / elementary school / Engineer / Nystul Chair and Professor of Computer Science / knowledge engineer / Author / professor / Professor of Computer Science / programmer / Editor / one of the first members / independent systems consultant / student SQA leader / Assistant Professor / SQA leader / member / /

Product

Joe Vandeville / /

ProgrammingLanguage

PHP / /

ProvinceOrState

Colorado / Florida / Arkansas / /

Region

West Florida / /

Technology

SOA / Information Technology / education technology / PHP / operating systems / knowledge management / artificial intelligence / data mining / web server / /

SocialTag