[author : Jonathan Erickson] #Edito
[author : Bruce Schneier]
Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Bruce shows how you can use them to improve security by modeling attacks.
[author : Jim Shapiro and David Shapiro]
To encrypt multiple messages in one transmission, Jim and David implement Ron Rivest's chaffing and package transform. Their technique is optimized to minimize memory usage, while making as few passes through the data as possible.
[author : Eva Bozoki]
The need to address IPv4's lack of security has prompted the release of a number of standards, protocols, and applications.
[author : Andrew D. Fernandes]
Andrew compares elliptic-curve cryptography to other cryptosystems. In the process, he shows how elliptic-curve cryptosystems are built.
[author : William F. Alexander]
Bill updates his DUMPROM utility by presenting a WDM version that runs on Windows 98 and Windows 2000. DUMPROM lets you examine the configuration ROM of any 1394 device.
[author : Bruce Powel Douglass and Srini Vasan]
The Unified Modeling Language can be used to capture concurrency models and associated parameters. Bruce and Srini show how, then describe schedulability analysis using Rate Monotonic Analysis.
[author : John Boyer]
The Extensible Forms Description Language is an XML extension language that addresses key problems involved with doing electronic commerce on the Web.
[author : Ed Wright]
The SPICE library consists of 952 portable Fortran routines with 79,369 lines of executable code and 153,649 comment lines. Ed shares his experiences in porting this large Fortran library to C, then from C to C++.
[author : Michael Swaine]
For Michael, James Gleick's new book Faster comes just in time.
[author : Al Stevens]
Al weathers hurricane Floyd, as he continues to build a C++-based generic, platform-independent graphics library.
[author : Paul Tremblett]
One way to deliver dynamic data content to static HTML pages is by leveraging the power of Java and JavaServer Pages. Paul shows you how.
[author : Jon Bentley]
Jon is out of sorts, as he grapples with the Merge Sort and similar algorithms this month.
[author : Dennis E. Shasha]
Ecco and Liane puzzle over the rules of friendship that exist on the island of Aresia, which has 27 ethnicities — and each at the other's throats.
[author : Eugene Eric Kim]
This month, Eugene examines Netscape Time: The Making of a Billion-Dollar Start-Up That Took on Microsoft, by Jim Clark with Owen Edwards; and Competing on Internet Time: Lessons from Netscape and Its Battle with Microsoft, by Michael E. Cusumano and David B. Yoffie.
[author : you]
[author : Nick Baran]
[author : Nick Baran and Amy Lincicum]
[author : Michael Swaine]