DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Secure coding
Secure coding
Vulnerability Assessment and Secure Coding Practices for Middleware Part 1
Rogue Automation: Vulnerable and Malicious Code in Industrial
Web Application Vulnerabilities and Insecure Software Root Causes: the OWASP Top 10
From Secure Coding to Secure Software
Vulnerabilities, Threats, and Secure Coding Practices
Software Analysis for Security
Security Training for Developers
Secure Coding Frameworks for the Development of Safe, Secure and Reliable Code
OWASP Secure Coding Practices Quick Reference Guide
Software Development Guidelines Jan 2019
Software Assurance: an Overview of Current Industry Best Practices
Oracle Software Security Assurance Oracle’S Methodology for the Development and Maintenance of Security in Its Products
Cyber Crime and Security: a Modern Day Threat
Scheme & Syllabus for Program
Introduction to the Secure Development Training Program
Current Security Trends and Assessment of Cyber Threats
Handles for Pentesting Modern Secure Coding: Bypassing Mobile Security Mourad M.H Henchiri Lecturer: Dept
Secure Coding in C and C++ Second Edition the SEI Series in Software Engineering Software Engineering Institute of Carnegie Mellon University and Addison-Wesley
Top View
Software Assurance: Enabling Security and Resilience Throughout the Software Lifecycle
Sifu - a Cybersecurity Awareness Platform with Challenge Assessment and Intelligent Coach Tiago Espinha Gasiba1* , Ulrike Lechner2 and Maria Pinto-Albuquerque3
Approaches to Secure Software
Conversational Code Analysis: the Future of Secure Coding Fitzroy D
Secure Coding Practices in the Software Development Capstone Project
ISO/IEC JTC 1/SC 22/OWGV N 0082 James W
Prevent Cybercrime and Insider Attacks in Your Company with Static Analysis
Application Security Part 1 of 2
Saija Sorsa Protocol Fuzz Testing As a Part of Secure Software Development Life Cycle
Fundamental Practices for Secure Software Development Essential Elements of a Secure Development Lifecycle Program Third Edition March 2018
Top 20 Critical Security Controls
Pedagogical Assessment of Secure Coding in Student Programs
Security Awareness & Anti-Phishing Training
(Draft) Mitigating the Risk of Software Vulnerabilities by Adopting A
Why Should You Take This Course? Why Should You Not Take This Course?
From Code to Customer: the Road to Making Our Products Secure
Guidelines for Secure Coding
The Art of Fuzzing
Security Assessment by Google Hacking Automation Tools for the Web Sites of Korea and the USA Universities
ETHICAL HACKING Certified Secure Coding for Software Developers (CSCSD)
A Survey of Security Patterns for Use in Software Development
COM737 Module Title: Developing Secure Software Level
Content Catalog 2021
A Framework for Producing Effective and Efficient Secure Code Through Malware Analysis
Code Review Guide
Top 20 List Version 1.0 (15 June 2021)
OWASP Secure Coding Practices Quick Reference Guide
Addressing Future Challenges in the Development of Safe and Secure Software Components
Data Security Threats: Education Systems in the Crosshairs
A Holistic Approach to Ensure Product Security
Secure Coding Guide
Security Assurance in the SDLC for the Internet of Things
Secure Coding Education: Are We Making Progress?
Defending Spacecraft in the Cyber Domain
Instrumented Fuzz Testing Using AIR Integers (Whitepaper)
Software Assurance Maturity Model How to Guide
A Comparative Study Analyzing Computer Programming College Students’ Pre-Knowledge and Post-Knowledge of Software Application Security Using Owasp
Secure Software Development Framework (SSDF)
Android Secure Coding Seminar
Secure Programming Lecture 18: Malware
Securing the SDLC
Are Cyber Operators Needed on Warships to Defend Against Platform Cyber Attacks?
Raising Secure Coding Awareness for Software Developers in the Industry
Secure Coding Practices
Secure Software Lifecycle Knowledge Area Issue 1.0
Secure Coding in Five Steps
Secure Coding Guide
SECURE CODING PRACTICES - an INDUSTRY PERSPECTIVE Milind K
The Tips and Tricks Guide to Software Security Assurance, Volumes 1& 2
Dod Developer's Guidebook for Software Assurance
CERT Secure Coding Standards Robert C
Secure Coding Principles –Being Able to Remediate Security Vulnerabilities by Applying Secure Coding Principles
Introduction of Software Security
How to Write Secure Code in C