Charts Security BugWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Charts Security Bug returned the following results.
RSS What is RSS?
Related Categories

 •   Testing and Analysis
 •   Automated Software Quality (ASQ)
 •   Application Lifecycle Management(ALM)
 •   Mobile Device Management
 •   Software Configuration Management (SCM)
 •   Source Code Control
 •   Industrial Mobile Computing/ Rugged Handhelds
 •   Application Security
 •   Business Process Management (BPM)
 •   Embedded Application Development

Related Searches
 •   Charts Production
 •   Charts Security Bug Company
 •   Charts Security Bug Global
 •   Charts Security Bug Presentation
 •   Charts Security History
 •   Charts Security Softwares
 •   Charts Texas
 •   Erp Charts Security Bug
 •   Indian Charts Security Bug
 •   Risks Charts
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Security: Examining the Heartbleed Bug by Hewlett-Packard Company

June 2014 - (Free Research)
This exclusive webcast discusses security solution that identifies and addresses bugs in your network that can potentially leak sensitive information. Tune in now to find out more. 
(WEBCAST) READ ABSTRACT |

Elementool Bug Tracking Keeps Software Fixes on Course by Elementool, Inc.

January 2008 - (Free Research)
Can you list all the issues your software team is working on? Can you sort them by severity, priority, features affected, and other criteria? Can you show the histories of all related actions? This article details how Elementool Bug Tracking can help. 
(ARTICLE) READ ABSTRACT |

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development. by IBM

October 2008 - (Free Research)
This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment. 
(WHITE PAPER)

Charting the way for the Information Governance imperative by RSD

September 2011 - (Free Research)
Read this white paper to learn more about how to reach compliance guidelines and better secure your most important information. 
(WHITE PAPER) READ ABSTRACT |

CW+ XpertHR: Computer staff salary survey by ComputerWeekly.com

July 2010 - (Free Research)
Although pay levels are unlikely ever again torise as fast as they did at the end of the 1990s when fears about the “millennium bug” stoked thefires of an already over-heated job market – or to fall as fast as they did when the bug failed to bite– employers are acutely aware of the need to keep a close eye on short- and long-term pay trends. 
(WHITE PAPER) READ ABSTRACT |

How Do You Measure Up Against Top IT Service Provider Benchmarks? 13 Must See Charts by Autotask Corporation

February 2014 - (Free Research)
This graphic whitepaper features 13 charts that will show you how your IT department compares to some of the top service providers. 
(WHITE PAPER) READ ABSTRACT |

Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop by Klocwork

November 2009 - (Free Research)
As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Management - IT handbook by SearchDataCenter.com

September 2012 - (Free Research)
Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider. 
(EBOOK) READ ABSTRACT |

Adaptive Security for the Health/Pharma Vertical by Juniper Networks, Inc.

April 2011 - (Free Research)
Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges. 
(WHITE PAPER) READ ABSTRACT |

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities? by i-Sprint Innovations (E-mail this company)

May 2014 - (Free Research)
This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

JIRA 4.1.2 by Atlassian

August 2010 - (Free Research)
IT Problem: JIRA provides issue tracking and project tracking for software development teams to improve code quality and the speed of development. Combining a clean interface for organising issues with customisable workflows, JIRA is the perfect fit for your team. 
(DOWNLOAD)

Sleeping Android: the danger of dormant permissions by ComputerWeekly.com

March 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Shavlik Customer Update: What is the Conficker worm, referred to as "Downadup"? by Shavlik Technologies

February 2009 - (Free Research)
This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact. 
(WHITE PAPER) READ ABSTRACT |

Trust in Your Cloud by VMware, Inc.

September 2011 - (Free Research)
Cloud computing is a new model for IT services leveraging the efficient pooling of an on-demand, self managed virtual infrastructure consumed as a service. Working in concert with the security partner ecosystem, VMware is helping businesses of all sizes migrate to secure cloud computing. 
(VIDEO) READ ABSTRACT |

Implementing Database Development: Best Practices for Oracle by Dell Software

April 2008 - (Free Research)
Quest Software offers a set of guiding principles to help organizations establish a methodology for best practices. 
(WHITE PAPER) READ ABSTRACT |

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

DDoS Attacks: 5 Steps to Prepare by Verisign, Inc.

December 2013 - (Free Research)
This helpful guide provides a number of considerations for your company to look over prior to a distributed denial of service (DDoS) attack in order to get your site back up and running as quickly as possible. 
(WHITE PAPER) READ ABSTRACT |

Aberdeen Research: BI for LOB Leaders by IBM

July 2011 - (Free Research)
This research presents a demonstrable connection between analytical adoption, and elevated business performance. This report is based on feedback from 222 executives in May and June 2011, across the globe. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts