IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software DevelopmentReports
 
Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: Read this whitepaper to find out three ways to balance IT needs with user demands.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
sponsored by SAP Community Network
PRESENTATION TRANSCRIPT: This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 26 Oct 2009 | Published: 26 Oct 2009

SAP Community Network

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement