EZINE:
In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
WHITE PAPER:
This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
CASE STUDY:
Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
WHITE PAPER:
Your customers expect the highest quality in the products you deliver. Discover how a comprehensive, integrated, automated requirements centric model and code based test environment managed with an extensible quality management system can increase market acceptance, ensure customer loyalty and deliver superior outcomes.
WEBCAST:
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
WHITE PAPER:
Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
WHITE PAPER:
This white paper is an excerpt from the book "Scaling Software Agility: Best Practices for Large Enterprises", and describes the iteration pattern and activities that a team engages in to create tested, value-delivered code in a short time box.
WHITE PAPER:
This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
WHITE PAPER:
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
WHITE PAPER:
This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.