[author : Jonathan Erickson] #Edito
[author : Aviel D. Rubin]
Although more complicated, the Leighton-Micali protocol is more elegant, efficient, and secure than the venerable Kerberos security protocol.
[author : William Stallings]
The Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit-card transactions on the Internet.
[author : Linden DeCarmo]
Security protocols can be performance assassins. Linden examines several multimedia security protocols, and explains why they can devastate performance.
[author : Uttara Nerurkar]
The security-design techniques Uttara presents here provide a way of modeling security by extending the functional model of the system, instead of divorcing one from the other.
[author : Marcelo Calbucci]
Central to Windows 2000 security are Security Descriptors — structures and associated data that contain the security information for securable objects.
[author : David Wendt]
David presents a technique that lets multiple language resources be built into a single resource DLL and automatically referenced by Windows applications.
[author : Wietse Venema]
There's no telling what intruders might leave behind when they break into your system overnight. Wietse describes how he analyzed an unknown program left behind by one intruder.
[author : Kurt Konolige, Jeanne Dietsch, and William Kennedy]
Robot control programs take a robot's sensory input, process it, and decide which motor actions the robot will perform. Our authors use the Colbert sequencer language to develop control code.
[author : Tom Schotland and Peter Petersen]
Error handling is an important issue in embedded systems, and can account for a substantial portion of a project's code. Our authors describe how they designed and implemented an exception-handling library.
[author : Martin Hallerdal]
The web-based Distributed Authoring and Versioning (WebDAV) specification defines a set of extensions to the HTTP protocol that let you collaboratively edit and manage files on remote web servers.
[author : Gary Bradski]
OpenCV is an open-source, computer-vision library for extracting and processing meaningful data from images.
[author : Michael Swaine]
To hear Michael talk about it, you'd think interactive toys and open source are kid's stuff.
[author : Al Stevens]
Al gets back on track in updating his Quincy IDE that hosts the GNU C/C++ compiler suite of tools on the Win32 platform.
[author : Mike Jennings]
How can you establish a network connection using Java? Mike shows how.
[author : Alexander Ananiev]
Generic tree traversal logic can be used with any type of tree-like structure or tree node, letting you focus on the application logic rather than the internals of the tree structure organization.
[author : Dennis E. Shasha]
Making money is the challenge Ecco and Liane are faced with this month.
[author : Gregory V. Wilson]
This month Greg looks at Programming Pearls, Second Edition, by Jon Bentley; Foundations of Multithreaded, Parallel, and Distributing Programming, by Gregory R. Andrews; GUI Bloopers, by Jeff Johnson; The Humane Interface, by Jef Raskin; Legal Battles That Shaped the Software Industry, by Lawrence D. Graham; The World of Scripting Languages, by David Barron; C for Java Programmers, by Tomasz Muldner; and XML Elements of Style, by Simon St. Laurent.
[author : you]
[author : Nicholas Baran]
[author : Shannon Cochran]
[author : Michael Swaine]