IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed   
Software Code Management Multimedia (View All Report Types)
 
Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Finding Gold with Analytics: 5 Key Metrics for Successful Software Development
sponsored by CollabNet
WEBCAST: Join us for a live demonstration of 5 key metrics you can use to answer many of the biggest, meatiest issues that confront development teams, and learn practical approaches for increasing efficiency and software quality in your development projects.
Posted: 10 Jul 2009 | Premiered: Jul 22, 2009, 13:00 EDT (17:00 GMT)

CollabNet

How Barclays Global Investors Centralized Development and Got Compliant--FAST!
sponsored by CollabNet
WEBCAST: Discover an ALM platform that will help meet aggressive government deadlines, centralize development, and implement a long-term strategy that has continued to power global development environments for years.
Posted: 07 Jan 2010 | Premiered: Jan 7, 2010

CollabNet

Agile Development with IBM Rational Synergy and IBM Rational Team Concert
sponsored by IBM
WEBCAST: See how to take advantage of these RTC and Jazz features with Synergy and Change source control and change management.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Modernizing Legacy Applications Saves Bottom Lines
sponsored by ServiceNow
VIDEO: Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process.
Posted: 26 Jan 2018 | Premiered: 19 Jan 2018

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement