WHITE PAPER:
This knowledge path begins with an overview of the JavaScript language to provide a foundation for writing JavaScript code. It then covers more advanced topics such as object-oriented JavaScript and DOM modification for HTML page manipulation before covering introductory Asynchronous JavaScript + XML (Ajax) concepts and how to make Ajax requests.
WHITE PAPER:
Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
WHITE PAPER:
Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
WHITE PAPER:
Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
WHITE PAPER:
In this brief white paper, you will get insight into an innovative SanDisk product that accelerates application performance in VMware guest machines.
WHITE PAPER:
In this white paper, learn how a rapid-deployment technology enables you to achieve faster time-to-value with your applications, respond quickly to changing business needs, and maximize new opportunities.
WHITE PAPER:
This white paper looks at cloud-computing and software-as-a-service (SaaS) technologies and what you need to know about these emerging trends.
WHITE PAPER:
View this white paper to learn more about what contributes to an effective business analytics buying criteria. It examines the importance of implementing an integrated infrastructure and its relationship to business analytics.
WHITE PAPER:
Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.