Web 2.0 Architectures

What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …

97 Things Every Software Architect Should Know

Don't we all sometimes wish we could just TAKE good advice, instead of thinking we have found a better way and make the mistakes we've been warned about? This book is a …

Cyber Crime Fighters: Tales from the Trenches

Every new technology has the capacity to be used for good or for evil. And where is a new way to commit crimes, criminals will find it. That being said, this book covers the …

Head First Networking

This book is really good example of why you shouldn't judge a book by it's cover. If you flip through it (and you're not acquainted with O'Reilly's "Head First" series), the …

iPhone security software: iVault pro

Password and data managers are the most common iPhone security applications. The device is getting more and more users and they want to have secure data on the go. While …

iPhone security software: Notes+

Notes+ is rather a simple utility - its main function is to be used as a note taking utility with a twist. The twist in this situation is a security lock which can be turned …