ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • E-Guide: Improving software with the building security in maturity model

    Sponsored by: SearchSecurity.com

    This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.

  • Webcast: How Security is well suited for Agile development

    Sponsored by: IBM

    View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.

  • Podcast: How Security is well suited for Agile development

    Sponsored by: IBM

    Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.

  • Empower your Developers

    Sponsored by: Coverity by Synopsys

    The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.

  • End-to-End Secure Client to Cloud Access

    Sponsored by: Intel

    In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.

  • E-Book: Technical Guide on Application Security: Secure Development

    Sponsored by: IBM

    When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.

  • Presentation Transcript: Path to a Secure Application

    Sponsored by: IBM

    This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.

  • Using Cyclomatic Path Analysis to Detect Security Vulnerabilities

    Sponsored by: McCabe Software, Inc.

    The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.

  • Beating Web Application Security Threats

    Sponsored by: Thawte Inc.

    The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.

  • Presentation Transcript: Three Reasons Why Security Fails and What to Do About It

    Sponsored by: Sophos

    Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.

  • Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle

    Sponsored by: SAP Community Network

    This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.

  • Optimize Business and IT With New Generation Application Lifecycle Management

    Sponsored by: SAP Community Network

    This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.

  • Protecting Web Applications from Attack and Misuse

    Sponsored by: Citrix

    Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.