IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code ManagementReports
 
Hands-on Oracle Application Express security
sponsored by ComputerWeekly.com
BOOK: This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation
sponsored by Linoma Software
CASE STUDY: In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop
sponsored by Klocwork
WHITE PAPER: As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity.
Posted: 22 Feb 2010 | Published: 01 Nov 2009

Klocwork

Seven Practical Steps to Delivering More Secure Software
sponsored by Fortify Software
WHITE PAPER: This paper provides seven practical steps that help to effectively secure your company's software and shows you how to quickly evaluate the current state of software security and create a plan for dealing with it throughout the development life-cycle.
Posted: 07 May 2007 | Published: 01 Dec 2006

Fortify Software

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Handling handoffs the Agile development way
sponsored by IBM
EGUIDE: Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Software complexity, integration drive business rules automation adoption trend
sponsored by IBM
EGUIDE: Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

IBM

The Full Team Approach to Managing Requirements
sponsored by SERENA Software, Inc.
EGUIDE: Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SERENA Software, Inc.
 
 
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement