Software Code Management White Papers

(View All Report Types)
Success with Static Analysis for Security: Why Code Audits Fail
sponsored by Parasoft Corporation
WHITE PAPER: This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Parasoft Corporation

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Reduce CPU Usage with 'SMART' SQL
sponsored by BMC Software, Inc.
WHITE PAPER: This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
Posted: 30 Nov 2009 | Published: 30 Nov 2009

BMC Software, Inc.

Toad for Oracle 10.5
sponsored by Dell Software
WHITE PAPER: Toad for Oracle v10.5 adds new features and enhances many existing ones. These changes are designed to save you time, increase accuracy and give you better visibility of your work environment - whether you’re a developer working in an unfamiliar database or maintaining legacy code, or a DBA trying to manage multiple databases.
Posted: 20 Jul 2010 | Published: 20 Jul 2010

Dell Software

A Practical Guide to Identifying Slow Code During Development
sponsored by Micro Focus, Ltd
WHITE PAPER: Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Micro Focus, Ltd

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork