IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed    Add to Google    Add to My Yahoo!
Secure Programming White Papers (View All Report Types)
Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by VMware
WHITE PAPER: In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


What Does It Mean to Have a Mobile-First Strategy?
sponsored by Venice Consulting
WHITE PAPER: In this e-guide, industry expert Steve Damadeo discusses what it really means to have a mobile-first strategy, given the need to focus on user needs. Additionally, you will learn about the differences between developing mobile cloud apps and native apps, as well as see 6 questions to consider when creating a mobile app.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Venice Consulting

The Hidden Costs of Compliance: 3 Biggest Transactional Risks
sponsored by Avalara
WHITE PAPER: This white paper outlines the three most important transactional risks to look out for in your organization. Learn how to manage transactional activities in your accounting, ERP, and ecommerce system and make these systems more accessible and affordable.
Posted: 13 Aug 2015 | Published: 05 Nov 2014


Driving Adoption of New Web Conferencing Technologies
sponsored by Vyopta
WHITE PAPER: This e-book guide explains how utilizing collaboration analytics minimizes wasted resources within your company, and allows you to align its usage with your specific business goals. Read on to find out more about strategies for scaling your collaboration usage and adoption.
Posted: 13 Aug 2015 | Published: 13 Aug 2015


MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013


Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement