IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed    Add to Google    Add to My Yahoo!
SDL Reports
 
E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

IBM

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Presentation Transcript: How Security is Well Suited for Agile Development
sponsored by IBM
PRESENTATION TRANSCRIPT: View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

IBM

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

Veracode eLearning Subscription
sponsored by Veracode, Inc.
TRAINING GUIDE: Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.
Posted: 07 May 2010 | Published: 07 May 2010

Veracode, Inc.

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement