Codes MeasuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Codes Measures returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Application Security
 •   Source Code Control
 •   Text and Code Editing
 •   Testing and Analysis
 •   Vulnerability Assessment
 •   Data Security
 •   Application Management and Maintenance
 •   Automated Software Quality (ASQ)
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Codes Measures Arkansas
 •   Codes Measures License
 •   Codes Measures Seminars
 •   Codes Measures Size
 •   Codes Ohio
 •   Codes Organization
 •   Codes Us
 •   Coding Codes Measures
 •   Improving Codes
 •   Information About Codes Measures
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 08, 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 01, 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 20, 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Zebra. We Tag It - E-Book by Zebra Technologies

April 2011 - (Free Research)
When you tag it, you can see it, measure it, and learn from it. Tagging gives visibility into business to make the right decisions, at the right time, with the right information. Zebra can tag it with everything from bar codes to badges to RFID. Get the right information to do it better. All you have to do is tag it. 
(EBOOK) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

The BPMS Value Proposition by SoftwareAG Inc., USA

March 2008 - (Free Research)
In this paper, you'll learn how BPM delivers value to both business and IT, and how BPM continues to evolve in response to the next generation of business demands. 
(WHITE PAPER) READ ABSTRACT |

Network Security Technologies Technical Guide by SearchSecurity.com

December 2012 - (Free Research)
Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more. 
(WHITE PAPER) READ ABSTRACT |

Database Middleware: Struggling with Performance? by Progress DataDirect

February 2011 - (Free Research)
Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

E-Guide: Preventing and detecting security vulnerabilities in Web applications by BlueCoat

July 2011 - (Free Research)
The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications. 
(EGUIDE) READ ABSTRACT |

Information Governance: Audit and Protection on the IBM System z Platform by IBM

November 2011 - (Free Research)
Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Integrating security into the ALM lifecycle by IBM

November 2011 - (Free Research)
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management. 
(EGUIDE) READ ABSTRACT |

E-Guide: Expert insights to application security testing and performance by IBM

November 2011 - (Free Research)
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle. 
(EGUIDE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network by Code Green Networks, Inc.

September 2009 - (Free Research)
Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data. 
(WHITE PAPER) READ ABSTRACT |

Hot Knives Through Butter: Evading File-Based Sandboxes by FireEye

February 2014 - (Free Research)
This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick. 
(WHITE PAPER) READ ABSTRACT |

Write Java code 17% faster by eliminating app server restarts by ZeroTurnaround

March 2014 - (Free Research)
Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes. 
(WHITE PAPER) READ ABSTRACT |

Code with Java simpler, faster, and easier by ZeroTurnaround

December 2012 - (Free Research)
Java developers know that testing code changes can be a huge pain, and waiting for an application to redeploy after a code fix can take an eternity. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? 
(WHITE PAPER) READ ABSTRACT |

How Does your Service Measure Up? Getting to Grips with Metrics by GoToAssist

July 2011 - (Free Research)
This quick guide will identify some of the most popular metrics that you should be measuring, look at ways in which you can measure them, and how to utilize these measures to improve your service delivery. 
(WHITE PAPER) READ ABSTRACT |

Measuring the Business Impact of Support by Citrix Online UK

July 2010 - (Free Research)
Customer support has long been a business mainstay. Yet, the business impact of support is seldom measured - despite the influence of support on higher revenue, customer satisfaction and increased productivity. This new ServiceXRG white paper explores the importance of quantifying the impact of support on your business. 
(WHITE PAPER) READ ABSTRACT |

Measuring Community Health with Indicee Analytics by Indicee

March 2014 - (Free Research)
The e-book provides examples of what to measure to ensure healthy, engaged communities, and how to measure it using analytics. Also included is a re-cap of the location for the full framework. 
(EBOOK) READ ABSTRACT |

E-Guide: Why your clients should measure their data center energy efficiency by Intel

February 2011 - (Free Research)
Read this E-Guide to learn more about why measuring data center efficiency is important for your clients and what exactly they should be measuring. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts