Practices CodeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Practices Code returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Business Process Management (BPM)
 •   Automated Security Auditing/ Source Code Analysis
 •   Source Code Control
 •   Data Security
 •   Testing and Analysis
 •   Application Management and Maintenance
 •   Vulnerability Assessment
 •   Business Intelligence Solutions
 •   Embedded Application Development

Related Searches
 •   Employee Practices Code
 •   Organization Practices Code
 •   Practices Code Manuals
 •   Practices Code Recovery
 •   Practices Code Wireless
 •   Practices Researching
 •   Pricing Practices Code
 •   Requirement Practices
 •   Schemas Practices Code
 •   Strategic Practices Code
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

11 Best Practices for Peer Code Review by SmartBear Software

August 28, 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 12, 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 19, 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

How Will the Transition to ICD-10 codes affect Health IT? by Virtusa Corporation

March 29, 2011 - (Free Research)
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion. 
(EGUIDE) READ ABSTRACT |

A Practical Guide to Identifying Slow Code During Development by Micro Focus, Ltd

April 07, 2011 - (Free Research)
Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them. 
(WHITE PAPER) READ ABSTRACT |

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice by SmartBear Software

August 22, 2012 - (Free Research)
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier. 
(EBOOK) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Efficient Release Management with Testing Automation by CA Technologies.

January 10, 2014 - (Free Research)
In this expert e-guide from searchSoftwareQuality.com, learn why "You can't manually test your way into quality code. You have to bake the testing into the code while the code is still cooking to make it work." Read now to discover best practices in utilizing test automation to keep costs low and quality high. 
(EGUIDE) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 19, 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 27, 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 08, 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

How Barclays Global Investors Centralized Development and Got Compliant--FAST! by CollabNet

January 07, 2010 - (Free Research)
Discover an ALM platform that will help meet aggressive government deadlines, centralize development, and implement a long-term strategy that has continued to power global development environments for years. 
(WEBCAST) READ ABSTRACT |

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

Top Data Integration Trends and Best Practices by Talend

April 2011 - (Free Research)
Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations. 
(EBOOK)

Database Development Best Practices by Dell Software

April 2008 - (Free Research)
Check out the Best Practices video with Steven Feuerstein. 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts