EZINE:
In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
WHITE PAPER:
This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
WHITE PAPER:
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
PRESENTATION TRANSCRIPT:
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
WEBCAST:
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
CASE STUDY:
Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
EGUIDE:
In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
WHITE PAPER:
In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.
WHITE PAPER:
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
EZINE:
When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.