Become proficient with security aspects before a web application goes live over the Internet.
Latest Security Articles
Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
It's essential to know the differences in these libraries and use them correctly. This brief tutorial will guide you.
With facilities to search, copy, extract segments, and more, the array class can handle pretty much any task you need to perform with ease.
Enhance your development skills and make your users' lives easier.
If you have written solid code, you have accomplished one half of the objective. Solid code is the protagonist, or hero, of our story, but testing is the more sedate side kick that often saves the day after the hubris of the hero has almost certainly lead to calamity.