IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed    Add to Google    Add to My Yahoo!
Secure Programming White Papers (View All Report Types)
 
Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

How to assess your applications' security vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: Discover how to triage the most critical open source security threats inside with this 4 step guide.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

How to Secure Your App-Driven Business
sponsored by IBM
WHITE PAPER: This white paper outlines key security dangers of mobile apps and how to eliminate them. Read on to learn how to build an effective app security strategy that is sustainable and scalable - and how to protect apps at every stage of development.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

How to Secure Your Ecosystem of Cloud-Based Apps
sponsored by MobileIron
WHITE PAPER: Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees. This white paper reviews one app security model and how it can be leveraged to secure cloud-based productivity suites on mobile devices.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement