Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼



site Search Results

Results for: herb sutter a false sense of security

Sort by: Relevance | Date

The Dr. Dobb's Developer Library DVD Order the NEW Discounted Dr. Dobb's Developer Library DVD 6
Purchase the fully searchable DVD for $59.95 - a 60% discount! Features 21 years of Dr. Dobb's Journal, 15 years of Sys Admin magazine, 14+ years of C/C++ Users Journal, 1 year worth of Dr. Dobb's Digest, podcasts, videos and more! Order Now.

Missing The Boat On Multithreading?

Dr. Dobb's Journal,
December 11, 2006

It's been 18 months since Intel introduced the first dual-core desktop processor, but only a handful of ISVs have written applications that exploit the multicore architecture. And that's a missed opportunity for PC vendors, commercial ISVs, custom application developers and solution providers serving the mainstream business market. - Parallel

Relational Databases 101

Dr. Dobb's Journal,
October 20, 2006

Understanding what relational databases are all about is the first step to effectively using them. - Database

Strategic Security: Developing a Secure E-Mail Strategy

Dr. Dobb's Journal,
October 20, 2006

Message encryption, along with other measures, should be a critical part of your overall security strategy. But poor planning could leave your organization compliant and yet still unprotected. Here's how to choose the right combination of encryption and protection technologies to suit your needs. - Security

Analysis: Network Access Control

Dr. Dobb's JournalMike Fratto
October 06, 2006

The network access control market has more players and plot twists than a crime novel. We follow the saga as Cisco and Microsoft partner to control the market, while the Trusted Computing Group struggles for mind share. - Security

Error Checking

Dr. Dobb's Journal,
October 05, 2006

Code reviews are just one means of detecting program errors. Ed looks closely at how errors evade detection and gives you the opportunity to play code reviewer. - Embedded Systems

Compliance Policy Development

Dr. Dobb's JournalJonathan Feldman
September 22, 2006

The best way to stay out of the regulatory hot seat and keep the compliance police at bay is to develop a comprehensive set of well-written policies. We examine your options and offer policy workbooks in several core technology areas. - Design

Top 10 Reasons Security Products Don't Work

Dr. Dobb's Journal,
August 30, 2006

There's no silver bullet for preventing attacks.

How to use ARM's data-abort exception

Dr. Dobb's Journal,
August 25, 2006

Processors giveth and processors taketh away. They can fetch and store data or they can refuse to do either. When your processor aborts a data access, what can you do? This in-depth article explains the hows and whys of data aborts on the ARM7 family of processors, including working code for a useful data-abort exception handler.

Whitebox Security Testing Using Code Scanning

Dr. Dobb's Journal,
August 14, 2006

Without automatic code scanning tools, scanning the source code requires a keen eye, concentration and an enormous amount of time to scan each line for security vulnerabilities. - Security

Code Quality Improvement  

Dr. Dobb's Journal,
June 16, 2006

Coding standards help you to improve code readability, produce consistent code, and prevent error-prone coding styles. Robert Buckley adds a note on MISRA-C and coding standards. - Tools

Previous 3 4 5 6 7 8 9 10 11 12 Next