IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications Reports
 
Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control enterprise applications. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchMobileComputing

Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

How to assess your applications' security vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: Discover how to triage the most critical open source security threats inside with this 4 step guide.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Mastering Mobile Application Management: How to Adopt MAM
sponsored by SearchMobileComputing
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

SearchMobileComputing

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement