This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)
The move to IBM DB2 software is surprisingly easy due to new SQL compatibility features. And this e-kit makes it fast, because it's packed with technical resources, demos, DB2 software downloads and more. Begin taking advantage of the DB2 product's administration, performance and cost benefits today through this e-kit.
Watch this videocast to learn how it is bringing the productivity of modern, industry-leading integrated development environments (IDEs) to COBOL, including the ability to deploy key business-critical COBOL applications to Windows 7, .NET, JVM and the cloud.
Oracle Database Lite Client, Branch Office and Web-to-Go have been removed from Oracle's technology price list and are no longer being actively developed. Now you are faced with a migration project.
According to Jonathan Lewis, there is a basic strategy to writing efficient SQL, but it requires knowledge of the data, the metadata, and the intent of the query. Kyle Hailey, though, will discuss his own approach to Visual SQL Tuning (VST) with some ringside support from DB Optimizer XE. Be sure to check out this exciting debate!
Posted: 04 Jun 2010 | Premiered: Jun 10, 2010, 14:00 EDT (18:00 GMT)
To ensure optimal performance for your SQL Server, you need 24/7 monitoring to identify and diagnose issues quickly and effectively. Access a complimentary 14-day trial to SQL Diagnostic Manager.
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.