Parts Of Coding SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Parts Of Coding Security returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Application Security
 •   Vulnerability Assessment
 •   Testing and Analysis
 •   Data Security
 •   Source Code Control
 •   Network Security
 •   Intrusion Prevention Solutions
 •   Embedded Application Development
 •   Managed Security Services

Related Searches
 •   Directories Parts Of Coding
 •   Networking Parts Of
 •   Parts Of Coding White Paper
 •   Parts Of Licenses
 •   Parts Of Papers
 •   Parts Of Tool
 •   Parts Of West Virginia
 •   Strategy Parts Of
 •   Techniques Parts Of Coding
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 19, 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Empower your Developers by Coverity

May 16, 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 02, 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How Verification Services Fortify Your Software Escrow Solution by Iron Mountain

December 28, 2011 - (Free Research)
This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 28, 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 28, 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 by SearchSecurity.com

April 11, 2012 - (Free Research)
In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions. 
(EGUIDE) READ ABSTRACT |

Programmer’s Guide: Using LucidWorks Enterprise to add search to your Web Application by Lucid Works

December 21, 2010 - (Free Research)
This step-by-step guide shows a programmatic approach to working with LucidWorks Enterprise, the search solution from LucidWorks Enterprise built on Apache Solr. We’ll show how to add content, index it, create a web page (with example PHP code) to send search requests and display results, and more.  
(WHITE PAPER) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Compliance and Risk Management: Factoring compliance as part of your risk management equation by IBM

November 2011 - (Free Research)
Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more. 
(EBOOK) READ ABSTRACT |

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2 by IBM

September 2011 - (Free Research)
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization. 
(EGUIDE) READ ABSTRACT |

Increase Productivity and Effectiveness of Merchandising Audits with the MC35 by Motorola, Inc.

March 2007 - (Free Research)
The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Veracode eLearning Subscription by Veracode, Inc.

May 2010 - (Free Research)
Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more. 
(TRAINING GUIDE) READ ABSTRACT |

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts