software security

Results: 17991



#Item
41

Use ITAM to track and maintain hardware and software assets through their entire lifecycle, reclaim unused licenses, support security efforts, manage vendors and contracts, and cut costs up to 50%.9

Add to Reading List

Source URL: rs.ivanti.com

- Date: 2017-11-03 12:53:21
    42

    The Gridiron Compliance Model Aptible Gridiron helps software engineering teams easily stand up and maintain information security management programs that can meet stringent compliance and security requirements, such as

    Add to Reading List

    Source URL: www.aptible.com

    - Date: 2018-03-21 14:07:12
      43

      Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

      Add to Reading List

      Source URL: www.azbar.org

      - Date: 2017-05-17 18:29:57
        44

        What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance January 26, 2018 Submission to March 2018 OAuth Security Workshop at Trento, Italy

        Add to Reading List

        Source URL: self-issued.info

        - Date: 2018-01-26 21:54:58
          45

          What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop, March 2018, Trento, Italy

          Add to Reading List

          Source URL: self-issued.info

          - Date: 2018-03-15 08:13:09
            46

            WEB APPLICATION SECURITY SCANNER Netsparker Desktop is a dead accurate, single user web application security scanner that is available as an on-premises Windows software. THE NEED FOR ACCURACY AND AUTOMATION IN WEB APPLI

            Add to Reading List

            Source URL: www.netsparker.com

            - Date: 2017-11-10 08:39:48
              47

              Maxthon Browser History Maxthon is a global software company that develops state-of-the-art web browsers that continually set new standards for simplicity, speed and security. Under the leadership of Jeff Chen, the found

              Add to Reading List

              Source URL: www.maxthon.com

              - Date: 2018-03-28 22:32:45
                48

                Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

                Add to Reading List

                Source URL: www.first.org

                - Date: 2017-08-08 15:42:43
                  49

                  CISQ Standards for Measuring Software Risk, Security, and Technical Debt

                  Add to Reading List

                  Source URL: it-cisq.org

                  - Date: 2018-03-27 13:12:49
                    50

                    Understanding Software Vulnerabilities Related to Architectural Security Tactics An Empirical Investigation of Chromium, PHP and Thunderbird Joanna C. S. Santos∗ , Anthony Peruma∗ , Mehdi Mirakhorli∗ , Matthias Gal

                    Add to Reading List

                    Source URL: design.se.rit.edu

                    - Date: 2017-03-13 17:03:48
                      UPDATE