- PKI: Broken, But Fixable
- Nov 30, 2011
- The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
|
- Software [In]security: Third-Party Software and Security
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- Software Systems Architecture: Viewpoints and Views
- Nov 10, 2011
- Capturing the essence and the detail of the whole architecture in a single model is just not possible for anything other than simple systems. By far the best way of managing this complexity is to produce a number of different representations of all or part of the architecture, each of which focuses on certain aspects of the system, showing how it addresses some of the stakeholder concerns.
|
- Software [In]security: Software Security Training
- Oct 31, 2011
- Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
|
- Want to Prove Agile Works? Practice Continuous Delivery!
- Oct 31, 2011
- Aaron Erickson, author of The Nomadic Developer, explains why Agile development teams must deliver and keep delivering on a regular schedule. The surest proof of your team's practicing Agile methodology correctly is that you continue delivering working product.
|
- System Center Opalis Integration Server 6.3 Unleashed: Architectural Design
- Oct 25, 2011
- This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where each model would be most beneficial. In addition to architecture, this chapter reviews how the various security models affect an OIS deployment.
|
- Scrum, Agile Practices, and Visual Studio
- Oct 5, 2011
- This chapter covers the characteristics of software engineering and management practices, the "situationally specific" contexts to consider, and the examples that you can apply in Visual Studio (VS). In this chapter, you learn about the mechanisms that VS (primarily Team Foundation Server [TFS]) provides to support the team enacting the process.
|
- Software [In]security: BSIMM3
- Sep 27, 2011
- BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
|
- 'But I Don't Want the Minimum!' Understanding the Concept of the Minimum Viable Product (MVP)
- Sep 22, 2011
- Does the word 'minimum' immediately raise your hackles? Aaron Erickson, author of The Nomadic Developer, emphasizes that learning to prioritize, getting to production early, and subsequently delivering in small increments are key disciplines in the practices of Agile and continuous delivery.
|
- Introduction to Design Patterns in C++ with Qt: Models and Views
- Sep 13, 2011
- In this chapter, you will learn how to use the model classes in Qt to represent many different kinds of data.
|
- Want to be Agile? Learn to Fail!
- Sep 12, 2011
- Aaron Erickson, author of The Nomadic Developer, asks you to recognize and learn from software project failures. Ending a doomed project before it becomes “too big to fail” is a crucial step in preventing that project from becoming a $100M+ failure that bankrupts the company.
|
- Garbage Collection: Why, When, and How?
- Sep 6, 2011
- Over the last decade, garbage collection has gone from being a sign of decadence among programmers to a must-have feature for a language. David Chisnall examines how various collectors work, along with their costs and benefits.
|
- Introducing Agile Analytics: A Value-Driven Approach to Business Intelligence and Data Warehousing
- Sep 6, 2011
- This chapter outlines the tenets of Agile Analytics and establishes the foundational principles behind each of the practices and techniques that are introduced in the successive chapters in this book.
|
- Service Intelligence: Improving Your Bottom Line with the Power of IT Service Management
- Aug 31, 2011
- In this chapter, Sharon Taylor looks at the basic ingredients of services and service practices. She also covers the basics of ITSM terminology to help shape your understanding of dialogue you need to have with IT Service Providers (ITSPs) to ensure service assets are exploited to the benefit of the business bottom line.
|
- Software [In]security: Balancing All the Breaking with some Building
- Aug 30, 2011
- Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
|
- Essential Skills for the Agile Developer: Avoid Over- and Under-Design
- Aug 29, 2011
- How do you avoid over- or under-designing your code? As Ward Cunningham once said, "Take as much time as you need to make your code quality as high as it can be, but don't spend a second adding functionality that you don't need now!" This chapter covers this "mantra for development: write high-quality code, but don't write extra code.
|
- Prototypes and Object Orientation
- Aug 27, 2011
- David Chisnall takes a look at the two dominant paradigms in object-oriented languages (classes and prototypes) and discusses the strengths and weaknesses of each.
|
- The Scariest (Disaster) Book I Have Ever Read, Part III
- Aug 17, 2011
- The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly which systems would be affected by an electromagnetic pulse, how they would be affected, and to what degree.
|
- MOF, ITIL, and Service Manager
- Aug 16, 2011
- This chapter discusses the service management processes specified in the Microsoft Operations Framework (MOF) and Information Technology Information Library (ITIL) supported by System Center Service Manager, including Incident, Problem, Change, and Configuration Management.
|
- The Scariest (Disaster) Book I Have Ever Read, Part II
- Aug 10, 2011
- The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can best prepare yourself for an electromagnetic pulse.
|