List of Gurus

The following people have contributed articles to CodeGuru

| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

L. Shyamal
L.D. Nelson
L5 Software Group, LLC
LJP
Lachezar Gorchev
Lakshmi Monda
Lance Jepsen
Langis Pitre
Lanz Jean-Claude
Larry Barrett
Larry Hansen
Larry Leonard
Lars Bergstrom
Lars Werner
Laura Kihlken
Laurent Kempi
Lea Hayes
Leandro Gustavo Biss Becker
Lee Hamel
Lee Hayward
Lee Marmara
Lee Nowotny
Lee Patterson
Leigh Stivers
Len Holgate.
Len Holgate
Lennart Steinke
Lenworth Henry
Leon Finker
Leonard Smith
Leonardo Bernardini
Leonid Belkind
Leonid Prokopovich
Leor Zolman
Les Jordan
Less P Wright II
Levente Farkas
Lewis Haupt
LiQintao
Liam Bateman
Liam Breck
Lior Peretz

Llew Goodstadt
Lloyd Williamsen
Lobster B
Lothar A. Haensler
Lothar Haensler
Lowe*Software
Lu Lianbo
Luca Missora
Luca Piergentili
Ludovic CHARRIER
Ludwig Ertl
Luigi Ottoboni
Luigi Santillo
Luis Barreira
Luis Garcia
Luis Ortega
Lutz Kretzschmar
Ly Nguyen
Lynn McGuire
lano1106
larryjf
li zhiwei
ljp
logan


Top White Papers and Webcasts

  • The relentless march of end user organizations toward cloud services continues, despite long-standing fears about information security, the lack of visibility into cloud provider security controls, and the shortcomings of controls available to those who utilize cloud services. And while more and more security-as-a-service (SaaS) solutions and application programming interfaces (APIs) are becoming available, many cloud service providers just aren't moving fast enough to address today's enterprise needs. Read …

  • Live Event Date: June 29, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster. IBM QRadar on Cloud is a market–leading, trusted solution that can be easily extended with apps and add–ons for user behavior analytics and cognitive security. If you are still relying on basic log collection tools or an aging collection of security point …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date