WEBCAST:
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
WHITE PAPER:
Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
WHITE PAPER:
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors.
WHITE PAPER:
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
WHITE PAPER:
With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
WHITE PAPER:
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
RESOURCE CENTER:
If you're an Android developer looking to get started creating apps for Windows 8, look no further than this resource center made just for you. You'll get tools on how to build Windows Store apps using a variety of programming languages, including blog posts, coding road maps, and much more.
EBOOK:
The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
EGUIDE:
It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.