WEBCAST:
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
WEBCAST:
Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)
WEBCAST:
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.
SOFTWARE DOWNLOAD:
The move to IBM DB2 software is surprisingly easy due to new SQL compatibility features. And this e-kit makes it fast, because it's packed with technical resources, demos, DB2 software downloads and more. Begin taking advantage of the DB2 product's administration, performance and cost benefits today through this e-kit.
VIDEO:
Join us to hear how Pure Storage is taking the complexity out of SQL storage architecture. Learn how Pure Storage customers have leveraged the power of flash to get the best out of their SQL investment.
SOFTWARE DEMO:
Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.