Source Codes Network BestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source Codes Network Best returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Source Code Control
 •   Application Security
 •   Data Security
 •   Open Source
 •   Network Security
 •   Embedded Application Development
 •   Testing and Analysis
 •   Automated Software Quality (ASQ)
 •   Vulnerability Assessment

Related Searches
 •   Conversion Source
 •   Conversions Source Codes Network
 •   Migration Source Codes
 •   Source Codes Infrastructure
 •   Source Codes Network Guideline
 •   Source Codes Seminars
 •   Source Codes Templates
 •   Source Demonstrations
 •   Source Manager
 •   Web Source Codes Network
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems by McCabe Software, Inc.

April 19, 2012 - (Free Research)
<p>Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.</p> 
(CASE STUDY) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Open Source at Intel: Building with the Ecosystem by Intel

March 26, 2010 - (Free Research)
To enable a broad spectrum of software environments and programs to run best on Intel processors and platforms, Intel offers deep technical expertise, makes significant contributions, and actively participates in standards bodies. Read on to learn more. 
(WHITE PAPER)

Top Data Integration Trends and Best Practices by Talend

April 11, 2011 - (Free Research)
Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations. 
(EBOOK)

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

How Barclays Global Investors Centralized Development and Got Compliant--FAST! by CollabNet

January 07, 2010 - (Free Research)
Discover an ALM platform that will help meet aggressive government deadlines, centralize development, and implement a long-term strategy that has continued to power global development environments for years. 
(WEBCAST) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Managing Software Intellectual Property by Black Duck Software

July 2008 - (Free Research)
This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

How Verification Services Fortify Your Software Escrow Solution by Iron Mountain

December 2011 - (Free Research)
This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Agile ALM Trends In SCCS, Requirements Management by Hewlett-Packard Company

June 2012 - (Free Research)
Did you know that the latest innovations for source code control systems (SCCS) and requirements management tools can not only help you enable a more agile software development process but also reap better returns on your application lifecycle management (ALM) investments? Read this expert e-zine to learn more. 
(EZINE)

Gap Analysis: The Case for Data Services by Red Hat

April 2012 - (Free Research)
<p>Read this white paper to fully understand the need for data services in today’s organizations. Then, learn why the best approach to fulfilling your data services needs might come in form of open source SOA – a cost-effective strategy for seamlessly integrating data services into your business.</p> 
(WHITE PAPER) READ ABSTRACT |

Open-Source PaaS Use Case Animation by Red Hat

December 2012 - (Free Research)
Watch this brief video to learn about a family of open-source technologies that enable you to achieve agile application development with greater availability, scalability, and control over your infrastructure - in a public or private PaaS environment. 
(VIDEO) READ ABSTRACT |

Computer Weekly – 25 March 2014: Get kids coding by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, we examine the latest moves to encourage children to learn to code, to help avoid future skills shortages. Facebook's Open Compute Project is bringing open source to the datacentre – we look at what it means for IT. And we profile Salesforce.com as the SaaS firm celebrates its 15th birthday. Read the issue now. 
(EZINE) READ ABSTRACT |

Driving Business Agility via a Software Supply Chain by Black Duck Software

July 2008 - (Free Research)
The purpose of this white paper is to lay out software development "supply chain" strategies, to nurture community culture, and to discuss techniques to improve code usage as software creation evolves toward greater complexity. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts