IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed    Add to Google    Add to My Yahoo!
Secure Programming White Papers (View All Report Types)
5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Executive Guide: Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365.
Posted: 12 Oct 2016 | Published: 31 Aug 2016

Symantec + Blue Coat

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006


Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

The Path to a Secure Application: A Source Code Security Review Checklist
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Read this white paper to learn a checklist to find and eliminate the source coding errors and design flaws that expose data, threaten operations, and cost your organization time and money.
Posted: 05 Feb 2007 | Published: 01 Feb 2007

Ounce Labs, an IBM Company

10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications
sponsored by Veracode, Inc.
WHITE PAPER: Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement