site Search Results
Results for: herb sutter a false sense of security
Order the NEW
Discounted Dr. Dobb's Developer Library DVD 6
Purchase the fully searchable DVD for $59.95 - a 60% discount! Features
21 years of Dr. Dobb's Journal, 15 years of Sys Admin
magazine, 14+ years of C/C++ Users Journal, 1 year worth of Dr.
Dobb's Digest, podcasts, videos and more! Order Now.
Missing The Boat On Multithreading?
It's been 18 months since Intel introduced the first dual-core desktop processor, but only a handful of ISVs have written applications that exploit the multicore architecture. And that's a missed opportunity for PC vendors, commercial ISVs, custom application developers and solution providers serving the mainstream business market. - Parallel
Relational Databases 101
Understanding what relational databases are all about is the first step to effectively using them. - Database
Strategic Security: Developing a Secure E-Mail Strategy
Message encryption, along with other measures, should be a critical part of your overall security strategy. But poor planning could leave your organization compliant and yet still unprotected. Here's how to choose the right combination of encryption and protection technologies to suit your needs. - Security
Analysis: Network Access Control
The network access control market has more players and plot twists than a crime novel. We follow the saga as Cisco and Microsoft partner to control the market, while the Trusted Computing Group struggles for mind share. - Security
Error Checking
Code reviews are just one means of detecting program errors. Ed looks closely at how errors evade detection and gives you the opportunity to play code reviewer. - Embedded Systems
Compliance Policy Development
The best way to stay out of the regulatory hot seat and keep the compliance police at bay is to develop a comprehensive set of well-written policies. We examine your options and offer policy workbooks in several core technology areas. - Design
Top 10 Reasons Security Products Don't Work
There's no silver bullet for preventing attacks.
How to use ARM's data-abort exception
Processors giveth and processors taketh away. They can fetch and store data or they can refuse to do either. When your processor aborts a data access, what can you do? This in-depth article explains the hows and whys of data aborts on the ARM7 family of processors, including working code for a useful data-abort exception handler.
Whitebox Security Testing Using Code Scanning
Without automatic code scanning tools, scanning the source code requires a keen eye, concentration and an enormous amount of time to scan each line for security vulnerabilities. - Security
Code Quality Improvement 
Coding standards help you to improve code readability, produce consistent code, and prevent error-prone coding styles. Robert Buckley adds a note on MISRA-C and coding standards. - Tools