Software Requirements Gathering Techniques

  • September 24, 2007 24 Sep'07

    The pros and cons of use case diagrams

    Putting too much into a use case diagram can often render the otherwise useful technique of use cases almost useless. Kevlin Henney recommends a more balanced and restrained approach in order to not lose readers in a myriad of bubbles and ...

  • August 29, 2007 29 Aug'07

    Techniques to help prevent software project failure

    By doing both prototyping and model-driven development, development groups will meet business needs, deliver projects on time and within budget and prevent project failure.

  • July 18, 2007 18 Jul'07

    Software requirements: Visual prototyping worth a thousand words

    Using Skyway Software's Visual Workspace, Southern States Cooperative improves its software requirements and development processes and moves into SOA application development.

  • May 30, 2007 30 May'07

    Product news from Blueprint, Codefast, Strangeloop and PreEmptive

    In this product update report, learn how Blueprint has overhauled the Profesy requirements tool, Codefast has teamed with Borland, Strangeloop Networks has announced tools that speed dynamic Web applications, and PreEmptive Solutions has released ...

  • May 15, 2007 15 May'07

    Application security shouldn't involve duct tape, Band-Aids or bubble gum

    By applying a multilayered approach to application security throughout the SDLC, software ships more securely, closer to the scheduled delivery date and closer to anticipated cost. How do you do that? Joe Basirico, a senior security trainer at ...

  • March 21, 2007 21 Mar'07

    Effective prototyping for quality software

    The authors of "Effective Prototyping for Software Makers" discuss the benefits of prototyping, how anyone can create a helpful prototype, and how the software development process is affected by the use of prototypes.

  • December 07, 2006 07 Dec'06

    Top Web application security threats for 2007

    Web application threats increased significantly in 2006, and they aren't expected to let up. SPI Dynamics identifies which Web application trends will be security concerns in 2007.

  • October 31, 2006 31 Oct'06

    Injection attacks -- Knowledge and prevention

    SQL injection is recognized as a major threat to application security, but what about other injection attacks? SPI Dynamics' Caleb Sima dissects these exploits and offers straightforward prevention techniques in this podcast.

  • October 19, 2006 19 Oct'06

    One simple rule to make your Web apps more secure

    If there's one thing developers should do to increase Web applications security, it's input validation, according to Caleb Sima, founder and CTO of SPI Dynamics. In this interview, he discusses the most dangerous threats to Web applications, such ...

  • August 30, 2006 30 Aug'06

    Prevent application logic attacks with sound app security practices

    Application logic attacks are common, dangerous and difficult to detect. In this interview, expert Rami Jaamour defines and analyzes logic attacks and provides in-depth security advice. As these threats become more popular, it is imperative to ...

  • August 10, 2006 10 Aug'06

    Ruby on Rails experiences serious security breach

    A security vulnerability has forced the creators of Ruby on Rails to issue an immediate upgrade. Version 1.1.5, which is being called a mandatory upgrade, is available now.

  • July 17, 2006 17 Jul'06

    Top attack methods against Web sites identified

    "Google" hacking and directed attacks such as SQL injection and cross-site scripting are the most dangerous attack methods Web sites face, according to a new study by Fortify Software.

  • June 23, 2006 23 Jun'06

    More attacks against Web-based applications expected

    The recent attacks against Yahoo and Google are only the beginning, experts say, as malware authors seek out vulnerable Web applications that are often hard to secure.

  • June 19, 2006 19 Jun'06

    Patch and protect: What to do if a security flaw is reported

    Your product has shipped, and now someone has reported a security vulnerability. What do you do now? David Coffey, principal security architect at McAfee Inc., explains what steps you should take.

  • June 08, 2006 08 Jun'06

    Want secure software? Break it first

    No software is perfect, but by thinking like a hacker you can better anticipate threats and create a more secure product.