IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding Vulnerabilities Multimedia (View All Report Types)
 
Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Taking Your Mobile Initiative Global – How to Ramp Up Faster and Be More Flexible
sponsored by Kony
WEBCAST: Learn best practices for accelerating the time to value of your global mobile initiatives, and respond to the unique user requirements of different global geographies.
Posted: 26 May 2015 | Premiered: May 26, 2015

Kony

Mobile Strategy for the Business Owner: The What, Why, and How of Great Apps
sponsored by Kony
WEBCAST: As a business professional, you know that mobile can play a huge role in meeting your team's objectives. What you may not know is how to get there: What it takes to balance the strategy, processes, technology, and collaboration required to make mobile a success.
Posted: 26 May 2015 | Premiered: May 26, 2015

Kony

3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO: This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015

Absolute Software

Commerce APIs: Realizing the Strategic Opportunity
sponsored by Mashery
WEBCAST: In this webcast, Peter Sheldon, a principal analyst with Forrester Research, explains how eCommerce professionals can build compelling cases for Commerce APIs in their own organizations.
Posted: 21 Apr 2015 | Premiered: Mar 21, 2012

Mashery
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement