IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding Vulnerabilities Reports
Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015


Manufacturing Goes Mobile: Highlights in MDM and Application Security
sponsored by IBM
WHITE PAPER: This white paper surveys the use of mobile device management (MDM) in the manufacturing industry. Read on to learn how you can leverage MDM to improve operational efficiency and bottom-line benefits.
Posted: 12 Aug 2015 | Published: 31 Dec 2014


Strategic Mobility: Boosting Operational Productivity for the Oil and Gas Sector
sponsored by Red Hat
WHITE PAPER: In this white paper, you will learn about the opportunities for mobile initiatives to drive efficiency across asset and workforce management, specifically in the competitive oil and gas sector.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Red Hat

The Top 6 Benefits of Switching to Enterprise Voice UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper highlights the top 6 benefits behind one software-based UC solution that will expedite all your collaborative initiatives. Read on here to learn how to access the following benefits that will lower the total cost of your enterprise communications.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

Polycom, Inc.

Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013


The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by
EBOOK: This buyer's guide can help you find the right threat intelligence service for your organization. Access it now to learn what features every successful threat intelligence platform must offer.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011


Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement