Become proficient with security aspects before a web application goes live over the Internet.
Latest Security Articles
Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.
Latest Developer VideosMore...
Latest CodeGuru Developer Columns
Become more proficient on the usage of statements to control the flow of execution through a C++/CLI application.
Discover (Rediscover?) an image-manipulating tool that's been around for ages, but is especially suited to working within the .NET framework.
The concepts of boxing and unboxing data might be second nature for many, but for newbies it's worth covering. And, the "old hands" may learn something new, as well.
Most developers face a grueling challenge to please their end users. We asked their top challenge is. With over 3,000 responses, the results are now available!