[author : Jonathan Erickson] #Edito
[author : Michael Arnold]
Digital watermarking is a security technique that provides copy protection, authentication, and more for audio and other forms of information. The approach Michael presents here is based on a statistical algorithm working in the Fourier domain.
[author : Don Davis]
Over the past 25 years, most security protocols have focused on securing network connections, ignoring relatively simple file-encryption problems. Don presents guidelines for avoiding a common security pitfall when combining encryption with digital signatures.
[author : Bruce Schneier and Elizabeth Zwicky]
SMTP banners that contain version information can result in security vulnerabilities. Our authors show how to close this hole.
[author : Daniel V. Bailey]
Daniel reports on Dmitry Sklyarov's analysis of PC-based digital rights management security techniques.
[author : Chang Sau Sheong]
System outage isn't just a hardware problem. The design and implementation of software must be robust and hardy enough to survive failures of all kinds.
[author : Manuel Lopez Michelone and Marcelo Perez Medel]
A photomosaic is a digital image made up of other digital images, pieced together by software.
[author : Eli Boling and Chuck Jazdzewski]
Kylix brings Borland's Delphi toolset and environment from Windows to Linux. And one of the most challenging aspects of the port involved exception handling.
[author : Linden deCarmo]
The PacketCable Security Specification provides rigorous security standards for cable-based telephony networks.
[author : David Cox]
The Instrument Markup Language is an XML dialect designed to aid in the exchange of data and commands with remote instruments.
[author : Robert Kiesling]
The rapidly increasing number of e-mail relay packages means interoperability challenges for programmers who need compatibility with existing e-mail software.
[author : Richard Dale]
Biometrics offers a strong authentication alternative to traditional passwords and tokens, and can do so without imposing the burden and cost of application source-code modification.
[author : Michael Swaine]
Just because Michael sees conspiracies everywhere, doesn't mean he's fantasizing. Or does it?
[author : Al Stevens]
If he didn't know before, you can bet Al knows now that Schroeder is the piano player and Linus is the blanket-holder. Al goes on to examine programming issues related to a specific DSP audio problem.
[author : Ed Nisley]
It's no surprise that microcontrollers and other embedded devices are used in life-support systems. But can you really, really trust them?
[author : Oliver Goldman]
Java provides two types of exceptions: checked and unchecked.
[author : Jiri Kripac]
The algorithm Jiri presents here performs undo/redo for a general network of interconnected objects.
[author : Dennis E. Shasha]
Ecco and Liane discover that urban planning in Texas isn't an oxymoron after all.
[author : Jack J. Woehr]
Jack examines a pair of books that focus on embedded systems: Embedded Controller Hardware Design, by Ken Arnold; and Programming Microcontrollers in C, Second Edition, by
[author : you]
[author : Shannon Cochran]
[author : Della Song]
[author : Michael Swaine]