[author : Jonathan Erickson] #Edito
[author : Thomas Beck]
In this two-part article, Thomas introduces a complete Continuous Integration solution.
[author : Len DiMaggio]
Java servlets differ from other types of programs, thereby affecting your testing strategies.
[author : Jean-Yves Mengant]
Jpydbg, the debugger Jean-Yves presents here, is a Python plug-in for the JEdit framework.
[author : Guy W. Lecky-Thompson]
Guy examines how you can test objects by creating specific test harnesses with verifiable datasets.
[author : Thomas H. Bodenheimer]
When collecting performance data from dozens—if not hundreds—of computers, automation is a necessity.
[author : Michael Abrash]
In the first installment of a three-part article, Michael discusses his greatest performance challenge ever—optimizing an x86 3D software rasterizer.
[author : Amit Klein and Steve Orrin]
HTTP Response Splitting is a powerful new attack technique that enables other attacks.
[author : Christopher Diggins]
[author : Thiadmer Riemersma]
Thiadmer's balloon-style Windows control is configurable for many purposes.
[author : Paul Kimmel]
NUnit and .NET's TraceListeners help you eliminate bugs from code.
[author : Richard Grimes]
The best place to avoid deadlocks is in the design stage—and that's where synchronization domains come in.
[author : Scott Meyers and Andrei Alexandrescu]
[author : Herbert H. Thompson and James A. Whittaker]
Format-string vulnerabilities happen when you fail to specify how user data will be formatted.
[author : Jeff Machols]
The Subversion version-control program provides all the benefits of CVS—along with many improvements.
[author : Doron Drusinsky]
Doron examines runtime monitoring, focusing on its application to robust system verification.
[author : Michael Swaine]
[author : Ed Nisley]
[author : Jerry Pournelle]
[author : Paul Martz]
[author : you]
[author : Dennis E. Shasha]
[author : Shannon Cochran]
[author : Shannon Cochran]
[author : Michael Swaine]