- June 25, 2007
Paul Duvall, co-author of a new book on continuous integration, discusses how CI has evolved and how it can improve software quality. He also offers some tips for development teams on how to do CI.
- June 04, 2007
The changing face of application lifecycle management (ALM) has application development organizations looking to tools and technologies that help them collaborate across functional silos, work across large geographic distances and work more ...
- May 21, 2007
Alistair Cockburn, a signatory on The Manifesto for Agile Software Development, talks about the agile landscape, what has changed and where his methodology, Crystal, fits in.
- April 18, 2007
AccuRev founder and CTO Damon Poole has developed a methodology he calls Hyper Agile. Recently he talked with SearchSoftwareQuality.com about the benefits of Hyper Agile, how it differs from other agile methodologies and how it helped in the ...
- March 21, 2007
The authors of "Effective Prototyping for Software Makers" discuss the benefits of prototyping, how anyone can create a helpful prototype, and how the software development process is affected by the use of prototypes.
- February 20, 2007
Software testing is uselss if it isn't complete. Statement and branch coverage can uncover glaring problems in unexecuted blocks of code, but they often miss bugs in the logic of your code. Path coverage, however, is a more comprehensive technique ...
- August 29, 2006
Foundstone's Hacme Casino shows some of the threats online gaming applications face and helps developers see how these issues may be present in their own code.
- May 09, 2006
Software security doesn't require completely changing your software development life cycle. Application security expert Gary McGraw, author of Software Security: Building Security In, talks about software security best practices that can be easily ...
- February 15, 2006
These are very basic tips on scalability testing, load testing, performance testing and functional testing, among others.
- January 09, 2006
Secure authentication methods for Web applications are discussed in this chapter of the OWASP Guide to Building Secure Web Applications and Web Services. Java and .NET are both covered. SAML, biometrics, SSL, forms-based authentication and other ...
- January 05, 2006
This section of the OWASP Guide to Building Secure Web Applications and Web Services will help you ensure applications are secure against all forms of input data. Techniques explained include data integrity checks, validation and business rule ...
- July 27, 2005
Web applications are vulnerable to a barrage of injection attacks, such as SQL injection and XSS. This chapter from OWASP explains how to secure your Web services against injection exploits.
- July 27, 2005
In this section of the OWASP Guide to Building Secure Web Applications and Web Service you'll learn how to ensure authenticated users have a secure association with their session, enforce authorization checks and prevent common Web attacks.