Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Smart cards: security risks

        Version 3 of the Java Card smart card specification, released in March 2008, overhauled the technical architecture of the smart card. The Connected Edition of the specification introduced a significantly enhanced execution environment and a new virtual machine. It includes new network-oriented features, support for web applications with new Servlet APIs, multi-threading and support for applets with extended and advanced capabilities. Such features add complexity to the smart card platform and the hosted applications, increasing the attack surface and introducing a multitude of vulnerabilities. The security models, testing and risk management programmes must cater for these susceptibilities. In this article we consider the new features of the Connected Edition and identify some of the security problems that developers need to be aware of.

        View E-Handbook
      • Conquer the endpoint backup challenge

        Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

        This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

        View E-Handbook
      • Overcome today's disaster recovery challenges

        The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

        View E-Book
      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
    • Page 1 of 3
      • Nothing happens with continuous delivery without continuous integration

        Lately, there's been a lot said about the role of continuous integration (CI), especially in terms of application development. Application development, however, only accounts for a small part of the overall lifecycle of an application. Given the success of CI and CI-based tools, project managers, IT directors and software architects are wondering how CI could be used in order to bring a similar level of success to other areas of the application lifecycle, be it design, administration, DevOps, runtime management and even decommissioning.

        This handbook takes an in-depth look at how CI is the basis for continuous delivery and deployment. Readers will learn how organizations are changing and merging roles, moving toward DevOps and automated processes -- all to enhance business capabilities.

        View E-Handbook
      • Best practices for application portfolio management

        In this handbook, find best practices in the daunting world of application portfolio management. Get the basics on building a business case for APM—as well as tips on measuring the financial benefit of each application.

        View E-Handbook
      • Scaling Agile: Best practices for large, multi-site projects

        Large-scale projects and multi-site teams encounter myriad issues with the various elements involved with Agile. This handbook offers practical advice on projects that fall victim to overhead costs, co-location discrepancies or any number of agility issues.

        View E-Handbook
      • Test management: Measuring quality in the Agile enterprise

        Measuring quality is not easy. Traditionally, software development teams have used defects found during testing to help determine when a product is ready to deploy. But in Agile environments, quality is baked in from the start, and defect counts may not be the best or only way to measure quality. In this handbook, experts look at key metrics collected throughout the Agile lifecycle to help managers get the data they need and determine when the application is ready to go live.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 2
      • Working with mobile application security management tools

        Security is crucial for all applications, but mobile apps require software teams to take measures above and beyond those required for Web apps. From simple things like preventing mobile apps from storing passwords, to more complex measures such as using secure data containers for sensitive company info, this handbook specifies best practices for managing mobile security throughout the application lifecycle.

        View E-Handbook
      • Making the software process seamless, slick and simple

        July 2012, Vol. 1 Iss. 3

        Includes:
        • Agile development provides ALM transparency for senior managers
        • Designing and implementing ALM quality dashboards
        • ALM tools: What to consider before integrating
        View E-Zine
      • Automation in ALM: The changing world of automated software testing

        Read this e-book to discover a series of expert articles covering: six tips for selecting automated test tools for Agile development; when it's appropriate to automate software testing and best practices for implementation; the important role of automated UI testing in exploratory testing; and how automation is changing the role of the software tester.

        View E-Book
      • Effective ALM planning: How to appoint an ALM management team

        Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with application development goals, explain concepts to management, and improve quality. In this e-book, readers will learn keys to ALM planning and effective ways to introduce ALM to the organization.

        View E-Book
      Page 1 of 2
    • Page 1 of 1
      • E-book: Establishing a test automation strategy

        Designed to help managers and QA groups better understand and take advantage of automation with a test automation strategy, this e-book describes a variety of techniques including test-driven development, performance testing and continuous integration and includes a two-part Q&A with Agile ALM author Michael Hütterman.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Application security testing: Protecting your application and data

        Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Application security: Managing software threats

        Addressing security concerns from the outset of a software project all the way through to production is the only way that enterprise application delivery teams can prevent skilled attackers from stealing sensitive corporate data. Yet in many organizations, what should be a top priority gets pushed to the backburner; in some cases, it's because tight-fisted (and short-sighted!) C-level execs won't provide the necessary resources, in others, it's because developers don't think it's their responsibility, and in still other cases, it's assumed that waiting until the last, prerelease phases of a project is sufficient for security testing. Get your most important application security questions answered in this handbook.

        View E-Handbook
      • Beating Web application security threats

        The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Employ application performance management, have happy customers

        Application performance management is getting more complicated. The same goes for enterprise applications. When just a single dissatisfied -- and vocal -- customer can dictate the rise and fall of an organization, it's high time that today's product managers ensure the performance of their mobile apps, application programming interfaces and Software as a Service. Solving performance issues, while a necessary and fruitful part of today's Web market, can also leave AppDev teams vulnerable to increased demands.

        If managers are realistic, they'll be quick to acknowledge that manual monitoring of an enterprise application production environment is no longer feasible. To that end, this three-part guide aims to answer the questions facing many product managers today. Specifically, we look at the steps that many managers should take first: load testing and performance monitoring. Readers will also get an in-depth look at the necessity of finding the right metrics, the importance of automation and the sorting and prioritizing of performance issues.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Cloud-based ALM tools spawn problems, solutions in project management

        The project manager has always been a wearer of several hats. In this handbook, readers will learn how cloud-based tools and DevOps are both adding to and taking away from the program manager's list of tasks, lengthy as it already is. Readers will find expert advice on expanding ALM teams with DevOps and cloud skills -- plus tips on making the DevOps role work in Agile teams.

        View E-Handbook
      • Project and portfolio management: Analyzing business project needs

        Software development project managers typically use input from customers, but some software teams that have development and quality assurance don't have anyone designated as a "product person." As a result, some businesses can be disorganized and unaware of the proper sequencing. Consult this informative handbook to find out how you can market a software project and keep everything under control with the right tools. Uncover the step-by-step process of managing customer driven software development as well as other important steps. Get answers to your touches project and portfolio management questions answered in this handbook.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Jump-start software testing and quality assurance

        Developing effective, efficient software involves much more than coding. There is a whole host of management and teamwork considerations that can make or break a development or quality assurance project, but identifying and implementing best practices can be a daunting task. In this handbook, discover strategies for fostering a strong development team from the ground up. Productivity and quality are as tied to management strategies as they are to programming chops. The handbook details methods for fostering cultures of productivity using Agile software development strategies, Development and Operations teams, and internal communications.

        View E-Handbook
      •  
      Page 1 of 1

Featured E-ZINES on searchSoftwareQuality.comView all >>

  • Business Information

    Cloud computing, mobile devices and massive amounts of data flowing into organizations are combining to put heavy pressure on business systems. To adapt, organizations have been forced to transform the way in which corporate information is managed.

  • ALM and Agile Strategies

    Best practice advice on the latest application lifecycle management (ALM) and agile techniques to help streamline the development and delivery of timely, effective, modern applications.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchSoftwareQuality.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchSoftwareQuality.comView all >>

  • Smart cards: security risks

    Version 3 of the Java Card smart card specification, released in March 2008, overhauled the technical architecture of the smart card. The Connected Edition of the specification introduced a significantly enhanced execution environment and a new virtual machine. It includes new network-oriented features, support for web applications with new Servlet APIs, multi-threading and support for applets with extended and advanced capabilities. Such features add complexity to the smart card platform and the hosted applications, increasing the attack surface and introducing a multitude of vulnerabilities. The security models, testing and risk management programmes must cater for these susceptibilities. In this article we consider the new features of the Connected Edition and identify some of the security problems that developers need to be aware of.

  • Conquer the endpoint backup challenge

    Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

    This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

OTHER FEATURED E-HANDBOOKS