Code Bank SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Bank Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Vulnerability Assessment
 •   Source Code Control
 •   Network Security
 •   Testing and Analysis
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Embedded Application Development
 •   Anti-Virus Solutions

Related Searches
 •   Buying Code Bank Security
 •   Code Bank Imports
 •   Code Bank Security Demos
 •   Diagram Code Bank Security
 •   Guidelines Code
 •   Implementation Of Code Bank
 •   Part Code Bank Security
 •   Quality Code Bank
 •   Specialists Code Bank
 •   What Is Code Bank
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 30, 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Malicious Code Detection Technologies by Kaspersky Lab

February 2008 - (Free Research)
This white paper provides an overview of the evolving combat tactics used in the antivirus battle, giving both simplified explanations of technological approaches as well as a broad chronological perspective. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

Essential Guide to Threat Management by SearchSecurity.com

March 2011 - (Free Research)
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time. 
(EGUIDE) READ ABSTRACT |

Architectural Quality: Design, Development and Testing Rules by hello2morrow, Inc.

September 2008 - (Free Research)
Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development. 
(WHITE PAPER) READ ABSTRACT |

Modern Malware Threats and Countermeasures by Sunbelt Software

November 2008 - (Free Research)
Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis by Coverity

March 2008 - (Free Research)
This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Driving Business Agility via a Software Supply Chain by Black Duck Software

July 2008 - (Free Research)
The purpose of this white paper is to lay out software development "supply chain" strategies, to nurture community culture, and to discuss techniques to improve code usage as software creation evolves toward greater complexity. 
(WHITE PAPER) READ ABSTRACT |

Service-Oriented Messaging by LEGACY DO NOT USE - IBM Corporation

December 2007 - (Free Research)
This Webcast explores the key elements necessary for improved SOA messaging. In this Webcast, you will examine the messaging benefits associated with JMS, HTTP, REST, SOAP, WS-Addressing, WS-ReliableMessaging, traditional message queues and intermediaries. You will how to leverage various messaging constructs during the services design process. 
(WEBCAST)

Empower your Developers by Coverity

May 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Writing secure SQL database code by IBM

May 2011 - (Free Research)
When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need. 
(EGUIDE) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts