ITauditSecurity
Skip to content
  • Home
  • About
  • Links
  • SiteMap
  • Twitter
  • Hidden
  • Copyright

Tag Archives: resource allocation

by ITauditSecurity | March 20, 2009 · 8:02 am

Write Safe and Secure Applications

The lead security study group (group 17) from the International Telecommunication Union provides a paper containing general suggestions for writing secure applications. In the paper, each item is hyperlinked to additional information.

Continue reading →

Share this:

  • Click to print (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Skype (Opens in new window)

Like this:

Like Loading...

Leave a comment

Filed under Security

Tagged as algorithm, application, boundary condition, buffer overflow, business, change management, code, complexity, cryptography, digital certificate, fuzzer, International Telcommunication Union, ITU, program, resource allocation, secure, Security, software, telecommunication, testing, vulnerabi, vulnerability

  • Enter your email address to to be notified of new posts by email.

    Join 1,291 other followers

  • Quick Links

    New IT Auditors Start Here
    CISA
    ACL Tips
    Blogging Tips
    Excel: Basic Data Analytics
    Ask a Question
    Reader Poll: Who R U?

  • Recent Posts

    • Another Nail in ACL’s Coffin
    • Critical Thinking? How about just Thinking?
    • Quote of the Weak – Auditor Judgment
    • Create a Help Desk for Data
    • Some Periodic Reviews Provide Little Assurance
    • Blogging about Internal Audit (10 tips)
    • Mack-the-Auditor Gets Audited! Part 3
    • Mack-the-Auditor Gets Audited! Part 2
    • Mack-the-Auditor Gets Audited! Part 1
    • Why this pic on this blog?
  • Top 7 Posts

    • ACL: How to Add a Conditional Computed Field
    • Is ACL Analytics Dying?
    • How to get an IT Audit job with little or no experience
    • Teach Yourself ACL
    • Free Downloads
    • ACL tip: Create a File Import Script
    • How to Audit User Access
  • Categories

  • Links

    • * Follow ME on Twitter *
    • Hidden
    • IT/Audit/Security Resources
  • Blogroll

    • Audit Monkey (not real active) The life and times of an Internal Auditor
    • risk3sixty IT audit blog
    • SANS Handler's Diary Daily security pulse
    • Security Monkey (not active, but still good content) Great security blog
ITauditSecurity · IT audit/security HOW-TOs, analysis, & humor
Website Powered by WordPress.com.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
<span>%d</span> bloggers like this: