IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Code Management Multimedia (View All Report Types)
 
Rules in a Microservices Architecture
sponsored by Vizuri
VIDEO: Discover how to update business rule management for microservices-based app development. Plus, learn how to streamline development cycles with the JBoss BRMS platform and OpenShift containers.
Posted: 11 Oct 2017 | Premiered: 09 Oct 2017

Vizuri

Build Your Business Apps on SAP Data
sponsored by K2
WEBCAST: Discover how to simplify and extend the use of SAP data across your organization by delivering apps that help you make the most of SAP data and surrounding systems with visual, low-code app development tools.
Posted: 10 Oct 2017 | Premiered: Oct 6, 2017

K2

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

CodePro AnalytiX
sponsored by Instantiations
TRIAL SOFTWARE: This IT download offers products which ensure Java code quality, providing powerful software tools for code audit, metrics, automated test case generation, code coverage analysis, dependency analysis and team collaboration.
Posted: 04 Sep 2007 | Premiered: 27 Aug 2007

Instantiations

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Bamboo 1.2
sponsored by Atlassian
TRIAL SOFTWARE: This IT download provides software known as Atlassian Bamboo which utilizes continuous integration to automate the process of building, integrating and testing software code, providing managers with greater insight into the development process.
Posted: 27 Sep 2007 | Premiered: 26 Sep 2007

Atlassian

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement