MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Misuse caseComputer security modelCapability-based securityItsecIso/iec 27018Protection profileAgile modelingDomain-specific modelingSoftware verificationIso/iec 27001Requirements traceabilityModel-driven architectureData modelingModel-based testingProduct requirements documentFunctional software architectureRequirements engineeringIso/iec 12207Iso 19011Iso 10303Domain modelDesign controlsArchitectural patternPrototype patternSoftware design and developmentFeature modelMisra cIt security standardsIso/iec 27017Software architectureProgramming modelObject process methodologyItil security managementReference architectureObject-modeling techniqueSoftware languageFormal methodsIso/iec 42010Computer security policySoftware quality assuranceObject-capability modelInternet standardCommon criteriaIso 15926Computer securityService-oriented architectureIso/iec 20000Software metricSoftware designModel-driven testingIso/iec 9126Application securityItilIso/iec 15504Cleanroom software engineeringTest planComputer security softwareIso 13567Iso 55001Process specification languageComponent business modelDesign by contractOpal storage specificationCanonical modelSoftware requirementsCodebaseBehavioral patternIso 22300Iec 62443Supply chain operations referenceSystems designAbstract data typeCaseCert coding standardsSecurity.txtInversion of controlAccess-control listProgram synthesisCheckstyleInformation securitySecure codingDesign patternSecure by designSecurity testingDesign scienceSoftware copyrightIdef1xCode reviewEnterprise architecture frameworkTrademarkSaml-based products and servicesComputer-automated designScopeIec 62304Physical schemaAbuse reporting formatInstruction set architectureDomain-driven designObject-oriented designSoftware construction