- Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
-
By
Gary McGraw
- Mar 26, 2010
- Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
|
- Agile Product Management with Scrum: Understanding the Product Owner Role
-
By
Roman Pichler
- Mar 24, 2010
- A new product is launched with great expectations—and bombs. What went wrong? There was no single person responsible for leading the effort to create a winning product—a product owner. This chapter explores the role of the product owner. It explains the role's authority and responsibility as well as how the role should be applied.
|
- Software [In]security: What Works in Software Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Feb 26, 2010
- 15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
|
- Software [In]security: Cargo Cult Computer Security
-
By
Gary McGraw
- Jan 28, 2010
- Gary McGraw argues that the time is right to turn to real science to combat the "Cargo Cult" mentality of the software security field.
|
- Enterprise Integration Patterns: Message Construction
-
By
Gregor Hohpe, Bobby Woolf
- Dec 31, 2009
- Simply choosing to use a Message is insufficient. When data must be transferred, it must be done through a Message. This chapter explains other decisions that are part of making messages work.
|
- Enterprise Integration Patterns: Messaging Channels
-
By
Gregor Hohpe, Bobby Woolf
- Dec 30, 2009
- Deciding to use a Message Channel is the simple part; if an application has data to transmit or data it wishes to receive, it will have to use a channel. The challenge is knowing what channels your applications will need and what to use them for.
|
- Implementation Patterns: Collections
-
By
Kent Beck
- Dec 28, 2009
- Kent Beck discusses the metaphors behind collections, the issues to be expressed through the use of collections, the collection interfaces and what they mean to the reader, the collection implementations and what they say, an overview of functions available in the Collections class, and finally a discussion of extending collections through inheritance.
|
- Software [In]security: You Really Need a Software Security Group
-
By
Gary McGraw
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Thomas Erl on the 15th Anniversary of Design Patterns
-
By
Thomas Erl
- Dec 14, 2009
- Thomas Erl shares his thoughts about Design Patterns: Elements of Reusable Object-Oriented Software on the 15th anniversary of its publication.
|
- Erik M. Buck on the 15th Anniversary of Design Patterns
-
By
Erik M. Buck
- Dec 7, 2009
- Erik M. Buck shares his thoughts about Design Patterns: Elements of Reusable Object-Oriented Software on the 15th anniversary of its publication.
|
- An Interview with John deVadoss on Patterns and Practices at Microsoft
-
By
John deVadoss, Larry O'Brien
- Dec 1, 2009
- Larry O'Brien interviews John deVadoss, the product unit manager of the patterns & practices team at Microsoft, about the purpose of the p&p group, how p&p extends beyond Microsoft, and how disruptive the many-core era will be in terms of software patterns and practices.
|
- Succeeding with Agile Software Development Using Scrum: Team Structure
-
By
Mike Cohn
- Dec 1, 2009
- In this chapter Mike Cohn looks at the importance of two critical factors to be considered when deciding how to structure Scrum teams: keeping teams small and orienting each team around the delivery of end-to-end user-visible functionality
|
- Gerard Meszaros on the 15th Anniversary of Design Patterns
-
By
Gerard Meszaros
- Nov 30, 2009
- Gerard Meszaros shares his thoughts about Design Patterns: Elements of Reusable Object-Oriented Software on the 15th anniversary of its publication.
|
- Design Patterns Explained: The Bridge Pattern
-
By
Alan Shalloway, James R. Trott
- Nov 23, 2009
- This chapter discusses the Bridge pattern, including an example to help you derive the Bridge pattern, key features of the pattern, and observations on the Bridge pattern from the authors' own practice.
|
- Design Patterns Explained: The Strategy Pattern
-
By
Alan Shalloway, James R. Trott
- Nov 23, 2009
- The Strategy pattern is a way to define a family of algorithms. In this chapter, the authors introduce a new case study and begin a solution using the Strategy pattern.
|
- William Wake on the 15th Anniversary of Design Patterns
-
By
William C. Wake
- Nov 23, 2009
- Bill Wake shares his thoughts about Design Patterns: Elements of Reusable Object-Oriented Software on the 15th anniversary of its publication.
|
- Russ Olsen on the 15th Anniversary of Design Patterns
-
By
Russ Olsen
- Nov 16, 2009
- Russ Olsen shares his thoughts about Design Patterns on the 15th anniversary of its publication.
|
- Framework Design Guidelines: Data Source Architectural Patterns
-
By
Martin Fowler
- Nov 11, 2009
- Martin Fowler discusses data source architectural patterns, including Table Data Gateway, Row Data Gateway, Active Record and Data Mapper.
|
- Framework Design Guidelines: Domain Logic Patterns
-
By
Martin Fowler
- Nov 11, 2009
- Martin Fowler discusses Transcription Script, Domain Model, Table Module and Service Layer.
|
- Software [In]security: BSIMM Europe
-
By
Gary McGraw, David Harper, Matias Madou, Florence Mottay
- Nov 10, 2009
- Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
|