In this excerpt from Large-Scale C++ LiveLessons (Workshop): Applied Hierarchical Reuse Using Bloomberg's Foundation Libraries, John Lakos discusses logical/physical coherence, where each logical subsystem is tightly encapsulated by a corresponding physical aggregate.
Using Apache Cordova 4, you can leverage native technologies and web standards to quickly build cross-platform apps for most mobile devices. In this chapter from Apache Cordova 4 Programming, John M. Wargo shows you what makes a web application a Cordova application and gives you a tour of the sample application the Cordova team provides.
Timothy Warner, author of Sams Teach Yourself Windows PowerShell 5 in 24 Hours, explains how Windows PowerShell releases are related to Windows version releases and which bits go with what. It's not a 1:1 relationship, so you might need to uninstall if things don't go quite as expected. With Tim's help and the Windows Management Framework, you'll get it right from the start.
Vulnerability and pentesting are both effective ways to check the status of your organization's security posture. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the three basic steps of vulnerability assessments and the proper use of penetration testing.
Too often, Mac OS X users are bound and gagged by the Graphical User Interface Apple provides. Not So Traenk...
I spend a lot of time online looking for answers. I spend a lot of time online crowd sourcing various communities for those answers. I spend a lot of time online sifting through the best online community based forums to find how-to tutorials and quick fixes. In this spirit, I present the best question/answer sites for developers, programmers, mobile devs and web hosting professionals.
Traenk mulls over his ethical hacking job and remote access technologies. Does user convenience make unseen threats more real?