Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of ronaldanthonylewis

ronaldanthonylewis

Send ronaldanthonylewis an email

Latest from ronaldanthonylewis

  • Software Development: Avoid these 10 common Web-based application security mistakes
    Developer

    Software Development: Avoid these 10 common Web-based application security mistakes

    Web-based application security is a major concern for all developers. Taking the time to secure your application development may involve nothing more than avoiding these common application security mistakes.

    ronaldanthonylewis
    Published:  February 13, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:49 AM PDT Read More See more Developer
  • Be prepared for release security certification and accreditation reviews
    Security

    Be prepared for release security certification and accreditation reviews

    The security certification and accreditation process that accompanies a software release can be a harrowing experience. However, with proper planning for application and data security, the stress can be reduced significantly.

    ronaldanthonylewis
    Published:  November 6, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Security
  • Ten commandments for the security-conscious programmer
    Developer

    Ten commandments for the security-conscious programmer

    You may not fully realize how the simple programming decisions you make every day can compromise security. Here are the steps you should take to keep hackers and other security threats at bay.

    ronaldanthonylewis
    Published:  May 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Developer
  • A must-read list for security-conscious programmers
    Security

    A must-read list for security-conscious programmers

    You have to understand security disciplines to build securable applications. Security expert Ron Lewis has assembled a guide to the very best security books on the market.

    ronaldanthonylewis
    Published:  May 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Security
  • Alpha Five: A prototyping tool to rival Access?
    Data Management

    Alpha Five: A prototyping tool to rival Access?

    Could the relatively unknown tool, Alpha Five, beat out Microsoft Access as the king of the prototyping world? Check out our review and decide for yourself.

    ronaldanthonylewis
    Published:  March 17, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:16 AM PDT Read More See more Data Management
  • Follow this five-step security testing process to bulletproof your app
    Printers

    Follow this five-step security testing process to bulletproof your app

    Like all testing, security testing should be done systematically to achieve the best results. Discover how these five easy testing steps can help decrease vulnerabilities in your apps.

    ronaldanthonylewis
    Published:  February 13, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Printers
  • Five steps to designing a secure system with TCB
    Security

    Five steps to designing a secure system with TCB

    Security must be a factor in system design from the beginning. It starts with defining the trusted computing base (TCB). Follow these steps to achieve a secure system.

    ronaldanthonylewis
    Published:  January 14, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Security
  • Secure your system with the TCB concept
    Security

    Secure your system with the TCB concept

    New legislation will make developers liable for security attacks. Consequently, security has risen in importance. Consider this approach to implementing security for your systems.

    ronaldanthonylewis
    Published:  January 7, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Security
  • Engineer security during initiation phase to help prevent system vulnerabilities
    Security

    Engineer security during initiation phase to help prevent system vulnerabilities

    Security can be an overlooked aspect of system development; often the need for it is realized during implementation. Avoid scrambling to handle such vulnerabilities by planning security measures during project initiation.

    ronaldanthonylewis
    Published:  October 1, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:16 AM PDT Read More See more Security
  • Improve application design with prototyping, modeling, and storyboarding
    Hardware

    Improve application design with prototyping, modeling, and storyboarding

    Meeting client expectations is the number-one goal of application development. Here's how one developer uses three approaches to handle different aspects of this critical objective.

    ronaldanthonylewis
    Published:  September 9, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:12 AM PDT Read More See more Hardware
  • 1
  • 2
  • Next
11 results

TechRepublic Premium

  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Change order form

    PURPOSE Change is inevitable in any technological sector; it brings new features, functions and opportunities and helps businesses prosper through evolution. However, change can be detrimental to company operations if not executed properly through advanced notification of and approval by involved personnel. This change order form is designed to help you plan, implement and track ...

    Published:  March 15, 2023, 12:00 PM EDT Modified:  March 16, 2023, 11:00 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic data disposal policy

    PURPOSE The purpose of this policy is to provide guidelines for the appropriate disposal of information and the destruction of electronic media, which is defined as any storage device used to hold company information including, but not limited to, hard disks, magnetic tapes, compact discs, audio or videotapes, and removable storage devices such as USB ...

    Published:  March 15, 2023, 12:00 PM EDT Modified:  March 16, 2023, 1:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice