10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Source Code Analysis

Source Code Analysis

LOGO_Source Code Analysis

Source Code Analysis

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Source code analysis of an application is one of the most powerful and effective methods for recognizing and resolving programming errors at an early stage.

Usually, two different approaches pursued, which can only achieve their full potential by combining them: static and dynamic testing methods.

With the former approach, the application is not executed, but analyzed on errors on the basis of predefined rules. These range from poor coding style over wrong type conversions to unintentional memory leaks with often serious impacts.

Since a static analysis is also prone to many putative errors (“false positives”), it always requires a subsequent assessment of all those issues found.

In addition, the use of dynamic testing procedures is an important instrument in order to minimize the amount of missed issues (“false negatives”) and to further increase the quality of the results.

To achieve this, dynamic testing follows a strategy where the application is first started, and then fed – during execution time – with prepared input data and to finally analyze the produced output data. If the returned result differs from the expected result, it is considered an error. The risk potential of these errors has to be manually examined and evaluated.

Reverse Engineering von Binärprogrammen, Verfahren und Geräten

LOGO_Reverse Engineering von Binärprogrammen, Verfahren und Geräten

Guidelines and Policies

LOGO_ Secure Coding Guidelines und Policys, sonstige Leitlinien und Standards

Penetration Testing

LOGO_Penetrationstests

Web Application Firewalls

LOGO_Web Application Firewalls, Web Shields oder Application Level Gateways

There are no entries in your notes.

Show notes



top

The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.