The Wayback Machine - https://web.archive.org/web/20150130021406/http://www.codeguru.com:80/cpp/frameworks/

Latest Frameworks Articles

Improve Microsoft Visual C++ Application Security and Robustness with SafeInt

In this age of cloud computing, massive parallel systems and complex security threats like identity theft and decentralized botnets, devoting resources to combat the seemingly age-old issue of integer overflow appears distinctly passC). Despite the fact that integer overflow is such a well know problem, particularly within C and C++ programming, the problem remains a real issue from both a defect and security standpoint, that's why the introduction of the SafeInt template class in Visual C++ 2010 to address overflows is a great addition.

The Smart Pointer That Makes Your C++ Applications Safer - std::unique_ptr

Using shared_ptr instead of raw pointers helps you avoid the common pitfalls associated with raw pointers but in some cases, its performance isn't satisfactory. Unique_ptr is a new C++0x smart pointer that is compact, fast and fully compatible with the standard library. Find out how to use unique_ptr to make your code safer without sacrificing performance.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date