Code GuidesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Guides returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security
 •   Text and Code Editing
 •   Source Code Control
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Embedded Application Development
 •   Vulnerability Assessment
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Code Guides Designing
 •   Code Guides Maintenance
 •   Code Guides Timeline
 •   Code Hr
 •   Code New Jersey
 •   Code Technical
 •   Communication Code Guides
 •   Configuration Code Guides
 •   Scripts Code
 •   Sheets Code Guides
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A Practical Guide to Identifying Slow Code During Development by Micro Focus, Ltd

April 07, 2011 - (Free Research)
Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Writing secure SQL database code by IBM

May 26, 2011 - (Free Research)
When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need. 
(EGUIDE) READ ABSTRACT |

How Will the Transition to ICD-10 codes affect Health IT? by Virtusa Corporation

March 29, 2011 - (Free Research)
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 25 March 2014: Get kids coding by ComputerWeekly.com

March 25, 2014 - (Free Research)
In this week's Computer Weekly, we examine the latest moves to encourage children to learn to code, to help avoid future skills shortages. Facebook's Open Compute Project is bringing open source to the datacentre – we look at what it means for IT. And we profile Salesforce.com as the SaaS firm celebrates its 15th birthday. Read the issue now. 
(EZINE) READ ABSTRACT |

Efficient Release Management with Testing Automation by CA Technologies.

January 10, 2014 - (Free Research)
In this expert e-guide from searchSoftwareQuality.com, learn why "You can't manually test your way into quality code. You have to bake the testing into the code while the code is still cooking to make it work." Read now to discover best practices in utilizing test automation to keep costs low and quality high. 
(EGUIDE) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 04, 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK)

Programmer’s Guide: Using LucidWorks Enterprise to add search to your Web Application by Lucid Works

December 21, 2010 - (Free Research)
This step-by-step guide shows a programmatic approach to working with LucidWorks Enterprise, the search solution from LucidWorks Enterprise built on Apache Solr. We’ll show how to add content, index it, create a web page (with example PHP code) to send search requests and display results, and more.  
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 08, 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 18, 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

Barcodes vs RFID: The pros and cons of each side reviewed by IQMS

October 02, 2013 - (Free Research)
This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction. 
(EGUIDE) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

CISO Guide to Next Generation Threats by FireEye

May 16, 2011 - (Free Research)
The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones 
(WHITE PAPER) READ ABSTRACT |

Handling handoffs the Agile development way by IBM

November 07, 2011 - (Free Research)
Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 07, 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

HP LoadRunner Software Tips and Tricks for Configuration Scripting and Execution by Hewlett-Packard Company

August 2008 - (Free Research)
This guide is intended to help new users and seasoned professionals learn new ways to design and implement successful load testing initiatives using HP LoadRunner. 
(ARTICLE) READ ABSTRACT |

5 Tips to Break Through ELT Roadblocks by Syncsort

February 2014 - (Free Research)
Learn how to put an end to the ETL vs. ELT debate once and for all and take a smarter approach to a high-performance ETL solution that overcomes the limitations of both SQL coding and conventional data integration tools. 
(EBOOK) READ ABSTRACT |

Tip Guide: Data scientists helping businesses navigate ‘big data’ seas by Sybase, an SAP company

February 2012 - (Free Research)
Data scientists are adept at a combination of analytical, statistical, machine-learning, coding and quantitative skills, with the desire and willingness to explore voluminous amounts of data. Check out this expert tip guide from SearchBusinessAnalytics.com to learn how a data scientist can help your business navigate the big data landscape. 
(EGUIDE) READ ABSTRACT |

Software Quality and Testing Best Practices by IBM

December 2013 - (Free Research)
DevOps and Agile essentially have the same motto: to deliver code more quickly, more cheaply, more frequently, and with greater reliability. In this e-guide, hear from Agile expert Lisa Crispin as she offers tips on how Agile techniques can help improve software testing strategies. Also, learn how to tackle three problem areas in DevOps adoption. 
(EGUIDE) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to Threat Management by SearchSecurity.com

March 2011 - (Free Research)
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time. 
(EGUIDE) READ ABSTRACT |

Software complexity, integration drive business rules automation adoption trend by IBM

November 2011 - (Free Research)
Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading. 
(EGUIDE) READ ABSTRACT |

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by IBM

September 2011 - (Free Research)
Read this expert Tip Guide for workable, profitable embedded software development best practices. 
(EGUIDE) READ ABSTRACT |

Getting Started: Learn to build Windows Store apps by Microsoft

April 2013 - (Free Research)
In this guide, discover all the fundamentals you need to get your first Windows app off the ground. Read on to explore everything from planning, selling, and packaging apps, to coding in XAML to HTML5 to C++, to concepts and architectures. 
(RESOURCE CENTER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts