Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼

Blogs

July 25, 2014

CRC: The C Stands for Confusion

Because it is so often abstracted, people don't always make smart choices about selecting and specifying CRCs.

March 31, 2014

Java SE 8 Beyond Lambdas: The Big Picture

In addition to Lambdas, Java 8 features changes to the way annotations are handled, array processing, VM size, garbage collection, and so much more.

April 23, 2013

BodyCom Development Kit

Use your body's electric field to authenticate




Security

Security Feature Articles RSS

Dr. Dobb's Archive

On this site is archived all the content from Dr. Dobb's that was published on the Web through December 31, 2014.

5 Steps to Protect Mobile Apps from Attacks

Mobile apps are important gateways to malicious attacks, just like Web apps. It's high time to begin thinking about mobile security as a top development priority. Where to begin?

Jolt Awards: The Best Books

The best books of the past 12 months.

The Internet of Overhyped Things

Vendors and analysts would have us believe that the Internet of Things is imminent. But, in fact, it will be years before the obstacles it faces can be surmounted.

Security Issues in Swift: What the New Language Did Not Fix

The security issues that existed in Objective-C have been only partially addressed in Swift. What to watch out for?

Security News RSS

Okta Identity Management Selection Pack For Developers

Ingredients: secure authentication, single sign-on, multi-factor authentication — may contain nuts

Free Microsoft Threat Modeling Tool 2014

A systematic way to find design-level security and privacy weaknesses in systems

Scanning Critical Security Defects In C# Open Source

OWASP and C# capabilities in scan service expanded

IEEE: Top Ten Software Security Design Flaws

The IEEE Center for Secure Design cybersecurity initiative has released a report titled "Avoiding the Top 10 Software Security Design Flaws"

Dovecot Gmail API Compatible REST API

Open source and complementary to existing email IMAP and POP3 protocols

Oracle Mobile Application Framework Arrives

Mobile-centric integration for back end services and security

Enterprise Java Development For Internet of Things

IoT-Ready Kaazing Gateway 4.0 JMS Edition

Free Microsoft Threat Modeling Tool 2014

A systematic way to find design-level security and privacy weaknesses in systems

CMMI Extends Framework For Security

Verification and validation updates feature in CMMI for Development V1.3

SUSE kGraft Live Patches Linux Kernel

Company pledges to submit kGraft upstream for standard live patching solution

Events of Interest

December 11-12. Washington, D.C. ModevCon

March 2-6, 2015 London, UK. QCon London

March 5-8, 2015. Recife, Brazil. Tropical Ruby

March 17-19, 2015. Boston, MA. O'Reilly Software Architecture Conference

March 23-24, 2015. Palo Alto, CA. Evans Data's 11th Annual Developer Relations Conference

April 8-16, 2015. Montreal, Canada. PyCon 2015

April 27-30, 2015. Baltimore, MD. 11th Software Engineering Institute (SEI) Architecture Technology User Network (SATURN) Conference

May 4-8, 2015. Chicago, IL. Microsoft Ignite Conference

May 12-14, 2015. Zaragoza, Spain.Protocols Plugfest Europe 2015


Videos of Past Events

September 2014. Atlassian Summit 2014

September 2013. JavaOne

June 2013. JAXConf 2013

May 2013. Google I/O

October 2012. JAXLondon 2012

September 2012. Strangeloop

July 2012. Java Language Summit

June 2012. Google I/O 2012

May 2012. Atlassian Summit

May 2012 (paid). Fluent Conference

March 2012. Multicore World

July 2011. JVM Language Summit