site Search Results
Results for: herb sutter a false sense of security
Order the NEW
Discounted Dr. Dobb's Developer Library DVD 6
Purchase the fully searchable DVD for $59.95 - a 60% discount! Features
21 years of Dr. Dobb's Journal, 15 years of Sys Admin
magazine, 14+ years of C/C++ Users Journal, 1 year worth of Dr.
Dobb's Digest, podcasts, videos and more! Order Now.
HTML Conversion and FTP Automation 
Lauren's HTML Automator program--built using IST's OpenExchange file conversion DLL, Distinct's TCP/IP Winsock library and SDK, and Borland's Delphi development environment--automates the process of converting data to HTML format and posting pages to a Web server. - Web Development
An Application-Access Security Model 
One roadblock at the beginning of any client/server development project is how to implement access security. Mark uses PowerBuilder to present an integrated, generic, reusable model of network security. - Security
Questions and Answers
Comparing CASE Tools
To examine CASE tools such as Paradigm Plus 2.0, Select OMT, and Together C++, Jeffrey designs an application that collects pricing information in grocery stores.
Image Authentication for a Slippery New Age 
Is seeing really believing anymore? Can we trust images as evidence of true events? The answer is generally "no," although image-authentication algorithms do make it possible to tell whether or not an image has been modified. Steve describes and implements a class of algorithms that makes it possible to authenticate digital images. - Security
Encapsulating the DOS IOCTL Interface
Letters
- Design
Symantec C++ Professional 
Before getting back to D-Flat++'s TED text editor, Al takes a second look at Symantec's technical support and C++ compiler. - C/C++
The Component Object Model
Microsoft's Component Object Model (COM) is a component-software architecture that allows applications and systems to be built from components supplied by different software vendors.