IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding Vulnerabilities Reports
 
Top 10 Ways to Maximize Business Investment with UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper examines one UC platform that you can integrate into your existing enterprise infrastructure. Access this vendor report to consider which enterprise video and voice solutions will drive employee collaboration, and the top 10 ways to maximize your business ROI.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: Explore how to integrate security into the app development process and deliver secure native-like apps to multiple devices.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Citrix

How to Vet and Deliver Better Mobile App Security
sponsored by Kony
EGUIDE: This complimentary resource provides two articles direct from the experts at SearchSecurity.com on how to achieve better mobile app security. Learn how to design a mobile-app security policy and discover four steps for vetting and delivering secure mobile apps.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Kony

Exclusive guide: How to ensure endpoint security
sponsored by TechTarget
RESOURCE: Access this exclusive guide, Endpoint Security in this Interconnected Age, to explore best practices for managing and securing various endpoints, including lap tops, mobile phones, tablets and more. Simply participate in our brief Secure Remote Access Research Program to claim your free copy of this valuable report.
Posted: 18 Mar 2014 | Published: 23 Feb 2015

TechTarget

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement