programming
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Simplexo SDK enhances database security
A new Software Developers Kit (SDK), designed to keep all information stored in corporate databases secure, has been launched by Simplexo. Simplexo Data-Secure SDK has been …
Cisco improves the security of the voice network
As IT managers look for ways to thwart voice fraud and other types of malicious activity, Cisco announced the Cisco UC Gateway Services API, a Web-based API that could play a …
Programming iOS 5, 2nd Edition
Get a solid grounding in the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition of Programming iOS …
Integrating PHP with Windows
Take your PHP programming skills deep into Windows—and build PHP applications that run efficiently and effectively on an array of Windows technologies. Packed with hands-on …
New SDKs for biometric identification and object recognition
Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …
Learning iOS Programming, 2nd Edition
Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …
Widespread use of vulnerable open source components
Sonatype and Aspect Security collaborated on a study of the real-world use of vulnerable versions of open source libraries. Used by developers around the world, open source …
Android security from the ground up
Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …
Risk across the phases of application security
A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …
Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
iOS 5 Programming Cookbook
Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …
Featured news
Sponsored
Don't miss
- 100+ domains seized to stymie Russian Star Blizzard hackers
- October 2024 Patch Tuesday forecast: Recall can be recalled
- Best practices for implementing threat exposure management, reducing cyber risk exposure
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
- CUPS vulnerabilities could be abused for DDoS attacks