[author : Jonathan Erickson] #Edito
[author : Herbert H. Thompson and Scott G. Chase]
Red-team security testing demands focused application security testing that is independent of the development group and usually falls outside normal application-testing channels.
[author : Niels Ferguson and Bruce Schneier]
Helix lets you perform both encryption and authentication—and does so fast! In fact, Helix appears to be twice as fast as AES.
[author : S. Srivatsa Sivan]
Single Sign-On systems authenticate users once, then authorize or reject them across multiple services. Sivan implements Single Sign-On using the Security Assertions Markup Language (SAML).
[author : Linden deCarmo]
The Redistribution Control Descriptor, commonly referred to as the "broadcast flag," is the controversial copy-protection and file-sharing technique some in the HDTV industry want to mandate.
[author : Oliver Goldman]
Argv, the extendible Java-based argument-handling library Oliver presents here, lets you parse argument types and string values.
[author : Brian A. Malloy, James F. Power, and Tanton H. Gibbs]
Brian, James, and Tanton examine how eight popular C++ compilers measure up to ISO conformance standards.
[author : Raul Murillo-Garcia]
Hard real-time control usually requires specialized hardware and software. Raul presents Simulink-Target for Real-Time Linux, a cost-effective tool for hard real-time control.
[author : Michael Swaine]
Does electronic voting have your "yea" or "nay" this election season? And what will we do when a hard-disk full of votes suddenly crashes?
[author : Ed Nisley]
Ed looks at the history of cryptography and examines what it means for embedded systems developers programming in Java today.
[author : Jack J. Woehr]
This month, Jack reviews The Art of UNIX Programming, by Eric Raymond; UNIX Systems Programming, by Kay Robbins and Steven Robbins; and Absolute OpenBSD, by Michael W. Lucas.
[author : you]
[author : Verity Stob]
[author : Shannon Cochran]
[author : Shannon Cochran]
[author : Michael Swaine]