Software  >   Systems Software  >   Programming Languages  >  

Functional Programming

RSS Feed   
Functional Programming Reports
 
Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

CW500: A roadmap to software-defined everything – Paddy Power Betfair
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

ComputerWeekly.com

The Holistic Learning Experience
sponsored by Cornerstone OnDemand
RESOURCE: According to a report published by Towards Maturity, only 15% of employees feel the training they receive prepares them for their next position. Access this resource to uncover how you can solve 3 challenges that arise when evolving from a training facilitator to learning curator.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Cornerstone OnDemand

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

App Testing and ALM: Selecting Your Tools for the Cloud
sponsored by Applause
EGUIDE: In this expert e-guide, Tom Nolle examines what it takes to create effective app testing and ALM techniques for cloud development. From test data management to horizontal integration, explore the key considerations for app testing in the cloud, and discover tips on what to look for when buying app testing and ALM tools.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause

How To Build An Enterprise Application Security Program
sponsored by Symantec + Blue Coat
EGUIDE: Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

Data Center Monitoring Tools and Tips to Keep IT in the Know
sponsored by Hewlett Packard Enterprise
EGUIDE: Data center admins have a seemingly never-ending to-do list when it comes to infrastructure monitoring. From server to equipment monitoring, it's a practice that's often difficult to juggle. Read on to view five tips to fine-tune your data center monitoring, including how to increase security and scalability.
Posted: 14 Feb 2017 | Published: 13 Feb 2017

Hewlett Packard Enterprise

Why Officially Supported Clients aren't Optional in API Projects
sponsored by TIBCO Software Inc.
EGUIDE: APIs are about more than just coordinating software processes, building code, and integrating the various pieces of app development – they're about community and communication. In this expert e-guide, explore the use of open source and building relationships with officially supported clients to help guide API projects.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

TIBCO Software Inc.

DCIM Tool Evaluation Guide
sponsored by RunSmart
EGUIDE: Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

RunSmart

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement