List of Gurus

The following people have contributed articles to CodeGuru

| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

V Girish
V. Girish
V. Lakshmi Narasimhan
V. Rama Krishna
V.Girish
V.N.S Arun
VGirish
Vachik Hovhannissian
Vadim Gorbatenko
Vadim Gorodnitsky
Vadim Sukhorukov
Vadim Z.
Val Golovlev
Valer BOCAN
Valer Bocan
Valerie Bradley
Valery R. Kim
Vasilenko Serhiy
Vasily Starostin
Vasudevan S
VectorX
Veena Pai

Vegard Fiksdal Technologies
VenCain
Venkat Gopala
Venkata Kancharla
Venkata Sundaram
Venu Vemula & Robert Walker
Venu Vemula
Vernero Cifagni
Vernon Sauder
Vicken Simonian
Victor Damian
Victor M. Grinenko
Victor Pavlov
Victor Vogelpoel
Victor Volkman
Vigen Dolbakyan
Vijay Mehta
Vijay Pandey
Vijay Sharma
VijayaSekhar Gullapalli
Vijayan TV
Vikram Kashyap
Ville Herva
Vinay Desai
Vinayak Gadkari
Vinayak Tadas
Vinayak
Vincent Leong
Vincent Scheib
Vineet Nandurkar
Vinoj Kumar
Vipul Lal
Vipul Patel
Vishal D. Khapre
Vishal Khapre
VishwanathBellur
Vitali Halershtein
Vitaly Katasonov
Vitaly Meytin
Vitaly Tomilov
VivekRagunathan
Vlad Kofman
Vlad Riscutia
Vladimir Kvashin
Vladimir Ofitserov
Vladimir Scherbakov
Vladimir Zubov
Volker Bartheld
Volker Bartheld
Volker Voecking
Vu Dang
Vyacheslav Biktagirov
Vyatcheslav Archibasov
venkatsriram
view resources within a DLL or EXE file
vlasta


Top White Papers and Webcasts

  • The software-defined data center (SDDC) and new trends in cloud and virtualization bring increased agility, automation, and intelligent services and management to all areas of the data center. Businesses can now more easily manage the entire lifecycle of their applications and services via the SDDC. This Aberdeen analyst report examines how a strong foundation in both the cloud and internal data centers is empowering organizations to fully leverage their IT infrastructure and is also preparing them to be able …

  • Whether a mandate to secure all web and mobile apps comes from a newly enlightened CIO or in response to a major security breach, beginning even a small application security program can be a daunting task. How will you know how many digital assets you have, let alone their risk profile? In this webinar we explore how, using a cloud solution like Fortify on Demand, even the largest organizations can begin to scan apps immediately and rapidly scale an application security program. Identify and risk rank assets, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date