IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Code Management Reports
 
Defend Against Injection-Based Attacks
sponsored by Rogue Wave Software
WHITE PAPER: In this informative paper, discover some of the most common security vulnerabilities currently plaguing the software development industry, and learn how static code analysis (SCA) can detect them.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Rogue Wave Software

E-Learning Provider Reduces Liferay Development Time with Jrebel
sponsored by ZeroTurnaround
CASE STUDY: In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

ZeroTurnaround

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

The Full Team Approach to Managing Requirements
sponsored by SERENA Software, Inc.
EGUIDE: Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SERENA Software, Inc.

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse
sponsored by Instantiations
WHITE PAPER: This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development.
Posted: 07 Feb 2008 | Published: 01 Sep 2007

Instantiations

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

AppDynamics Lite
sponsored by AppDynamics
TRIAL SOFTWARE: AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now.
Posted: 28 Jul 2010 | Premiered: 16 Jul 2010

AppDynamics

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Software complexity, integration drive business rules automation adoption trend
sponsored by IBM
EGUIDE: Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement