Software  >   Systems Software  >  

Computer Languages

RSS Feed   
Computer Languages Multimedia (View All Report Types)
 
Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

IBM Smart SOA Global Virtual Forum: How to Get Smarter Business Outcomes
sponsored by IBM
WEBCAST: Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)

IBM

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Ultimate SQL Tune-Off
sponsored by Embarcadero Technologies, Inc.
WEBCAST: According to Jonathan Lewis, there is a basic strategy to writing efficient SQL, but it requires knowledge of the data, the metadata, and the intent of the query. Kyle Hailey, though, will discuss his own approach to Visual SQL Tuning (VST) with some ringside support from DB Optimizer XE. Be sure to check out this exciting debate!
Posted: 04 Jun 2010 | Premiered: Jun 10, 2010, 14:00 EDT (18:00 GMT)

Embarcadero Technologies, Inc.

Demo: Protecting Microsoft SQL Server 2008 Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Watch this video demonstration to see exactly how FalconStor Continuous Data Protector is used to protect and recover your Microsoft SQL Server data.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

PrimalScript Professional 4.0
sponsored by SAPIEN Technologies, Inc.
TRIAL SOFTWARE: PrimalScript Professional 4.0 now with a host of advanced features targeted at reducing script development time and effort and introducing PrimalScope, PrimalScript's truly built-in debugger for Windows scripting.
Posted: 01 Oct 2006 | Premiered: 01 Oct 2006


Delivers Superior Database Results with New Storage Appliances
sponsored by Oracle and IntelĀ®
VIDEO: This video highlights the benefits of Oracle's ZFS Storage Appliance for Oracle Database. These appliances are the first application-engineered storage.
Posted: 12 Jun 2014 | Premiered: 12 Jun 2014

Oracle and IntelĀ®

Windows PowerShell 2.0
sponsored by Microsoft
WEBCAST: Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended.
Posted: 12 Jun 2009 | Premiered: Jan 9, 2009

Microsoft

What's New in Toad for Oracle v11.6
sponsored by Dell Software
WEBCAST: Watch this video to find out why Toad for Oracle is the best solution for database professionals. Find out more about how it combines the functionality available with specialized editions built for a job function. It also offers accured code development and a simpler approach to administration.
Posted: 14 Jan 2013 | Premiered: Jan 7, 2013

Dell Software

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences