MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Security engineeringSecure codingApplication lifecycle managementSoftware development securitySoftware deploymentComputer access controlInformation securityComputer securitySoftware developmentRelease managementSoftware supply chainComputer security softwareSoftware verificationInformation security managementSystems development life cycleBrowser securityMobile securitySoftware quality assuranceAndroid software developmentCybersecurityProblem managementData center securitySoftware life cycleCloud computing securityDevopsCodebaseRequirements traceabilitySoftware release life cycleProject managementDomain engineeringSoftware architectureSoftware system safetySoftware configuration managementInformation assuranceSecurity managementNetwork securityIso/iec 12207Code auditSoftware design and developmentIt security standardsApplication softwareSecurity testingKnowledge engineeringEnterprise application integrationSystems programmingInformation technology managementEvent managementComputer programmingApplication-release automationSecure by designIt riskSystem integration testingItil security managementIt portfolio managementSystems managementScopeSoftware engineeringProduction supportE-securityApplication performance managementSoftware craftsmanshipAutomotive securitySite reliability engineeringSoftware product managementAgile architectureDigital securityBuild automationRequirements engineeringComputer security policyCapability-based securityApplications architectureCi/cdItsecProduct managementItgcEnterprise architectureManufacturing process managementApplication frameworkConfiguration managementCode reviewContract management softwareSoftware buildSoftware asset managementSystem of systems engineeringEndpoint securityContinuous deploymentOperating environmentDevops toolchainProgram lifecycle phaseCleanroom software engineeringAuthorizationIntegrated development environmentIt service managementDomain-specific modelingComputer security modelInformation technology auditCert coding standardsNeurosecurityExtended static checkingTechnology management