IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design Reports
 
Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

E-Guide: Improving software with the building security in maturity model
sponsored by SearchSecurity.com
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

SearchSecurity.com

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Presentation Transcript: How Security is Well Suited for Agile Development
sponsored by IBM
PRESENTATION TRANSCRIPT: View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

IBM

10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

VMware

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement