Latest Scripting Articles

JavaScript Security

See how you can tighten security gaps using JavaScript and practices such as the Same Origin Policy, Data Tainting, and Signed Scripts.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Understanding .NET Encryption

Understanding .NET Encryption

There's no shortage of functionality built into the .NET framework to help you encrypt and secure your data. Follow along and feel more secure.

Top White Papers and Webcasts

  • The advent of compute accelerators, special purpose coprocessors that significantly improve the performance of traditional host-based central processing unit (CPU) computations, represents a major transition in the tools available to achieve supercomputing power. This white paper presents Dell solution offerings and shows how they push the envelope of available solutions that bring immediate added value to HPC users in terms of integration, flexibility, and efficiency of hybrid compute solutions.

  • Live Event Date: January 27, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT For years, identity and access management (IAM) has been seen as the project of denial, restriction, limitation and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue-generating work. In fact, at times, the processes forced employees, partners and customers to spend precious time searching for ways to circumvent the IAM infrastructure in order to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date