Computers and networks Security TP2 Trusted PaaS Environment for Containerized Services
-
Updated
Jun 16, 2018 - Java
Computers and networks Security TP2 Trusted PaaS Environment for Containerized Services
Vendor-Neutral Security Tool Automation Controller (over REST)
........... The projects and homeworks are part of the course CSE-565 : Computer Security [Fall 2018 @ UB_SUNY]................ Course Instructor : Marina Blanton (http://www.acsu.buffalo.edu/~mblanton/)
Building Security features on file transfers from scratch
Fundamentals of software security encryption algorithm using java
A simple Java command-line utility to mirror the CVE JSON data from NIST.
A Java library for parsing and programmatically using threat models
A simple Java command-line utility to mirror the entire contents of VulnDB.
Same vulnerable app as swsec-intro, but in a more modern framework.
Integrates Dependency-Check reports into SonarQube
Jenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Add a description, image, and links to the software-security topic page so that developers can more easily learn about it.
To associate your repository with the software-security topic, visit your repo's landing page and select "manage topics."