Software Requirements Gathering Techniques
- September 24, 2007
Putting too much into a use case diagram can often render the otherwise useful technique of use cases almost useless. Kevlin Henney recommends a more balanced and restrained approach in order to not lose readers in a myriad of bubbles and ...
- August 29, 2007
By doing both prototyping and model-driven development, development groups will meet business needs, deliver projects on time and within budget and prevent project failure.
- July 18, 2007
Using Skyway Software's Visual Workspace, Southern States Cooperative improves its software requirements and development processes and moves into SOA application development.
- May 30, 2007
In this product update report, learn how Blueprint has overhauled the Profesy requirements tool, Codefast has teamed with Borland, Strangeloop Networks has announced tools that speed dynamic Web applications, and PreEmptive Solutions has released ...
- May 15, 2007
By applying a multilayered approach to application security throughout the SDLC, software ships more securely, closer to the scheduled delivery date and closer to anticipated cost. How do you do that? Joe Basirico, a senior security trainer at ...
- March 21, 2007
The authors of "Effective Prototyping for Software Makers" discuss the benefits of prototyping, how anyone can create a helpful prototype, and how the software development process is affected by the use of prototypes.
- December 07, 2006
Web application threats increased significantly in 2006, and they aren't expected to let up. SPI Dynamics identifies which Web application trends will be security concerns in 2007.
- October 31, 2006
SQL injection is recognized as a major threat to application security, but what about other injection attacks? SPI Dynamics' Caleb Sima dissects these exploits and offers straightforward prevention techniques in this podcast.
- October 19, 2006
If there's one thing developers should do to increase Web applications security, it's input validation, according to Caleb Sima, founder and CTO of SPI Dynamics. In this interview, he discusses the most dangerous threats to Web applications, such ...
- August 30, 2006
Application logic attacks are common, dangerous and difficult to detect. In this interview, expert Rami Jaamour defines and analyzes logic attacks and provides in-depth security advice. As these threats become more popular, it is imperative to ...
- August 10, 2006
A security vulnerability has forced the creators of Ruby on Rails to issue an immediate upgrade. Version 1.1.5, which is being called a mandatory upgrade, is available now.
- July 17, 2006
"Google" hacking and directed attacks such as SQL injection and cross-site scripting are the most dangerous attack methods Web sites face, according to a new study by Fortify Software.
- June 23, 2006
The recent attacks against Yahoo and Google are only the beginning, experts say, as malware authors seek out vulnerable Web applications that are often hard to secure.
- June 19, 2006
Your product has shipped, and now someone has reported a security vulnerability. What do you do now? David Coffey, principal security architect at McAfee Inc., explains what steps you should take.
- June 08, 2006
No software is perfect, but by thinking like a hacker you can better anticipate threats and create a more secure product.