Statistics Security Testing ForWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Statistics Security Testing For returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Testing and Analysis
 •   Application Management and Maintenance
 •   Vulnerability Assessment
 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Automated Security Auditing/ Source Code Analysis
 •   Load, Stress & Performance Testing

Related Searches
 •   Benefits Statistics Security
 •   Companies Statistics Security
 •   Owning Statistics
 •   Size Statistics
 •   Statistics Security Administration
 •   Statistics Security History
 •   Statistics Security Price
 •   Statistics Security Resource
 •   Statistics Security View
 •   Statistics Vermont
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Application security testing: Protecting your application and data by IBM

November 07, 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

Empower your Developers by Coverity

May 16, 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

Try Rational AppScan by IBM

November 03, 2009 - (Free Research)
Download Rational® AppScan® Standard Edition V7.9, previously known as Watchfire AppScan, a leading Web application security testing tool that automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow. 
(ASSESSMENT TOOL)

Assuring Software Security Through Testing by (ISC)2 UK Ltd

February 25, 2014 - (Free Research)
This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market. 
(WHITE PAPER) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 09, 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

Rational® AppScan® Standard Edition V7.8 by IBM

March 13, 2009 - (Free Research)
Rational® AppScan® Standard Edition V7.8 automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow. 
(TRIAL SOFTWARE)

Solution Spotlight: A Guide to Agile Testing for QA and Test Managers by IBM

December 06, 2012 - (Free Research)
In this expert e-guide, Lisa Crispin, co-author of the book Agile Testing explains why a testing taxonomy such as the Agile testing quadrants can be a highly effective tool to help with these uncertainties. Read on to learn how the quadrants work and how they can be applied in your organization. 
(EGUIDE) READ ABSTRACT |

Magic Quadrant for Application Security Testing by Hewlett-Packard Company

July 02, 2013 - (Free Research)
Access this in-depth analyst report from Gartner on the top vendors in application security testing (AST) to find out which category of testing your organization needs to protect against intensifying targeted attacks. 
(ANALYST REPORT) READ ABSTRACT |

2013 Magic Quadrant for Application Security Testing by IBM

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(WHITE PAPER) READ ABSTRACT |

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing by IBM

March 10, 2010 - (Free Research)
Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Magic Quadrant for Static Application Security Testing by Veracode, Inc.

February 17, 2011 - (Free Research)
In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Expert insights to application security testing and performance by IBM

November 11, 2011 - (Free Research)
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle. 
(EGUIDE) READ ABSTRACT |

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Cloud Testing Production Applications: CloudTest Strategy and Approach by SOASTA, Inc

December 2012 - (Free Research)
This white paper discusses the three most frequently discussed topics about testing in production (security, test data, and potential live customer impact), and describes how the methodology helps to achieve high confidence testing in production. 
(WHITE PAPER) READ ABSTRACT |

The Many Faces of Software Testing by McCabe Software, Inc.

May 2012 - (Free Research)
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Vulnerability Scanning and Compliance by Dell SecureWorks UK

August 2011 - (Free Research)
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Expert tips for embedded software development by SAP America, Inc.

December 2012 - (Free Research)
Development teams often face strict compliance, security and testing requirements when tasked with developing embedded software. This useful e-guide provides tips for developing reliable embedded devices, strategies for ensuring embedded software security and tools and best practices for embedded software testing. 
(EGUIDE) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Emerging trends in testing - conclusions from the 2013-2014 World Quality Report by Hewlett-Packard Company

October 2013 - (Free Research)
Software quality and testing is of the utmost importance for businesses today, especially as applications increase in complexity and mobile applications gain traction in the enterprise. How do you stack up to other companies in terms of quality and testing? 
(WEBCAST) READ ABSTRACT |

Security in Cloud Computing by CSC

January 2013 - (Free Research)
This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts