Better Software Magazine Articles

Project Roundup

Have misplaced priorities or a lack of focus allowed your development project to run wild? Don't let a stampede of defects, repairs, and requirements change drive your project. Follow Robert Galen's advice, and corral that development with release criteria.

Bob Galen's picture Bob Galen
Who do You Trust?

The defensive programmer may sometimes feel a touch of paranoia in his work, but it’s all part of the job. Writing code today that is robust and defensive will help protect against the potential errors of the unforeseeable future.

Tod Golding's picture Tod Golding
When an Emergency Takes Center Stage

The middle of an emergency is no time to make a plan. Take a look at this installment of "Management Chronicles" to learn how not to be prepared for an emergency situation, and then read the Story Lines for some helpful, preparatory advice.

Peter Clark
A Look at GreenBlue Inspector by Ecyware

Why should hackers have all the good tools? Marnie Hutcheson takes a look at Ecyware's GreenBlue Inspector, an inexpensive tool that automates gray box vulnerability testing for simple data types, buffer overflow, SQL injection, and cross-site scripting in forms, cookies, and client requests.

Marnie Hutcheson
A Critical Line of Defense

Tackle software vulnerabilities at the root—in the applications themselves.
 

Herbert H. Thompson
Do-It-Yourself

Projects collapse in a variety of ways and for a variety of reasons. Fortunately there are things you can do to stabilize and rebuild your project before the dust settles. With these expert tips and a little elbow grease, you'll have the tools you'll need to renovate almost any failing project.

Mike Cohn's picture Mike Cohn
The Enemy Within

Not all threats come from outsiders. In an era of downsizing, layoffs, and pay cuts, sometimes it's your own disgruntled employees (or ex-employees) who are targeting you. Get some tips to help you protect your software from sabotage.

Clarke Ching's picture Clarke Ching
Trust Everyone, but Cover Your Assets

Need a place to go to get the solutions you've been craving? Management Fix is what you've been looking for. In this issue, find out how to manage when you suspect someone on your team may have been stealing from the company.

Elisabeth Hendrickson's picture Elisabeth Hendrickson
A Killer Bug for the New Millenium

We're pleased to bring you technical editors who are well respected in their fields. Get their take on everything that relates to the industry, technically speaking. In this issue, find out why our guest editor thinks he's found the bug that will once again bring testers to the forefront—a bug that dwarfs Y2K and could put big, rich software companies out of business.

James Whittaker's picture James Whittaker
Case Your Own Joint

Hackers are going to probe your system looking for weak spots and holes. What will they find? Learn how to uncover your own security vulnerabilities before the bad guys do.

Chris Wysopal

Pages

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.