IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding Vulnerabilities Reports
 
WAN optimization: Expert guidelines to management and security
sponsored by SearchEnterpriseWAN.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one solution to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchEnterpriseWAN.com

Mobility-as-a-Service: See What's New in Workforce Mobility
sponsored by Sprint
WHITE PAPER: High device prices and complex management requirements can fall short when you're in the process of rethinking your mobility. This white paper examines a new mobility-as-a-service platform. Read on to learn how you can receive new and improved wireless service benefits.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Sprint

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

E-guide Exclusive: The Top 3 Tips for Selecting a DRaaS Provider
sponsored by Assuritive
EGUIDE: In this exclusive e-guide, expert Paul Kirvan shows you the pitfalls to avoid when considering DRaaS to support your mission-critical enterprise systems. Read on here to access the following guiding principles when choosing DRaaS.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Assuritive

Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: Today, big corporate breaches can attack from every angle, so you need to be prepared. View now and learn how big data enables predictive security to mitigate mobile threats before they come in.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Lookout

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

The 3 Steps to Protect Your Software Apps from Failure and Attack
sponsored by Rogue Wave Software
WHITE PAPER: This white paper outlines three important steps that software development teams can follow to identify critical coding errors and security vulnerabilities, and protect software against failure and malicious attacks.
Posted: 11 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement