Performance

From Guidance Share

(Difference between revisions)
Jump to: navigation, search
Revision as of 00:14, 15 July 2007 (edit)
Admin (Talk | contribs)

← Previous diff
Revision as of 00:16, 15 July 2007 (edit)
Admin (Talk | contribs)

Next diff →
Line 1: Line 1:
-This section is focused on helping you meet your software performance objectives.+ 
* [[Performance Engineering]] * [[Performance Engineering]]
Line 7: Line 7:
{| style="background-color:transparent;" {| style="background-color:transparent;"
|valign="top" style="padding-right: 1em; "| <!--[[Image:CountermeasuresCenter.jpg|Countermeasures Center |left|]]--> |valign="top" style="padding-right: 1em; "| <!--[[Image:CountermeasuresCenter.jpg|Countermeasures Center |left|]]-->
-[[Image:CountermeasuresCenter.jpg|Countermeasures Center |left|]] '''Welcome to Security Guidance Share!''' This section features security specific guidance. Use security engineering to shape software security throughout the life cycle. Use threat modeling to help you identify your key security design issues. Use security design, code, and deployment inspections to implement proven practices. Use the software threats, attacks, vulnerabilities and countermeasures to understand security issues and apply appropriate defenses.+[[Image:CountermeasuresCenter.jpg|Countermeasures Center |left|]] '''Welcome to Security Guidance Share!''' This section is focused on helping you meet your software performance objectives. Use performance engineering to shape software performance throughout the life cycle. Use performance modeling to help you identify your key performance design issues. Use performance design, code, and deployment inspections to implement proven practices. Use the guidelines, principles, and practices to improve your software performance.
|} |}

Revision as of 00:16, 15 July 2007


Welcome to Security Guidance Share! This section is focused on helping you meet your software performance objectives. Use performance engineering to shape software performance throughout the life cycle. Use performance modeling to help you identify your key performance design issues. Use performance design, code, and deployment inspections to implement proven practices. Use the guidelines, principles, and practices to improve your software performance.


Focus Centers

Threats and Countermeasures - This section focuses on threats, attacks, vulnerabilities and countermeasures.


Security Engineering - This section includes specific security techniques that help you meet your security objectives.


Security Inspections - This section focuses on performing design, code, and deployment inspections to improve software quality.


Threat Modeling - You can use threat modeling to shape your software's design to meet your security objectives, and reduce risk.



Tech Centers

Knowledge Base

Reference



. . .

Personal tools