WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
EGUIDE:
To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management.
CASE STUDY:
Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
WHITE PAPER:
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
WHITE PAPER:
This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
WHITE PAPER:
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
WHITE PAPER:
In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
EGUIDE:
Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided.
EBOOK:
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier.
EGUIDE:
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.