Skip to content

TechRepublic

Trending Now

Pentagon finds concerning vulnerabilities on blockchain
Article

Pentagon finds concerning vulnerabilities on blockchain

Video Call Chatting Communication Concept
Image: Getty Images/iStockphoto
Article

Employers need to embrace new tech for new ways of working

Supply chain management concept vector illustration
Image: Visual Generation/Adobe Stock
Article

Unfortunately, the global chip shortage will continue

Google Hangouts invites
Article

Google says farewell to Hangouts

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of ronaldanthonylewis

ronaldanthonylewis

Send ronaldanthonylewis an email

Latest from ronaldanthonylewis

  • Software Development: Avoid these 10 common Web-based application security mistakes
    Developer

    Software Development: Avoid these 10 common Web-based application security mistakes

    Web-based application security is a major concern for all developers. Taking the time to secure your application development may involve nothing more than avoiding these common application security mistakes.

    ronaldanthonylewis
    Published:  February 13, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:49 AM PDT Read More See more Developer
  • Be prepared for release security certification and accreditation reviews
    Security

    Be prepared for release security certification and accreditation reviews

    The security certification and accreditation process that accompanies a software release can be a harrowing experience. However, with proper planning for application and data security, the stress can be reduced significantly.

    ronaldanthonylewis
    Published:  November 6, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Security
  • Ten commandments for the security-conscious programmer
    Developer

    Ten commandments for the security-conscious programmer

    You may not fully realize how the simple programming decisions you make every day can compromise security. Here are the steps you should take to keep hackers and other security threats at bay.

    ronaldanthonylewis
    Published:  May 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Developer
  • A must-read list for security-conscious programmers
    Security

    A must-read list for security-conscious programmers

    You have to understand security disciplines to build securable applications. Security expert Ron Lewis has assembled a guide to the very best security books on the market.

    ronaldanthonylewis
    Published:  May 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Security
  • Alpha Five: A prototyping tool to rival Access?
    Data Management

    Alpha Five: A prototyping tool to rival Access?

    Could the relatively unknown tool, Alpha Five, beat out Microsoft Access as the king of the prototyping world? Check out our review and decide for yourself.

    ronaldanthonylewis
    Published:  March 17, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:16 AM PDT Read More See more Data Management
  • Follow this five-step security testing process to bulletproof your app
    Printers

    Follow this five-step security testing process to bulletproof your app

    Like all testing, security testing should be done systematically to achieve the best results. Discover how these five easy testing steps can help decrease vulnerabilities in your apps.

    ronaldanthonylewis
    Published:  February 13, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Printers
  • Five steps to designing a secure system with TCB
    Security

    Five steps to designing a secure system with TCB

    Security must be a factor in system design from the beginning. It starts with defining the trusted computing base (TCB). Follow these steps to achieve a secure system.

    ronaldanthonylewis
    Published:  January 14, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Security
  • Secure your system with the TCB concept
    Security

    Secure your system with the TCB concept

    New legislation will make developers liable for security attacks. Consequently, security has risen in importance. Consider this approach to implementing security for your systems.

    ronaldanthonylewis
    Published:  January 7, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Security
  • Engineer security during initiation phase to help prevent system vulnerabilities
    Security

    Engineer security during initiation phase to help prevent system vulnerabilities

    Security can be an overlooked aspect of system development; often the need for it is realized during implementation. Avoid scrambling to handle such vulnerabilities by planning security measures during project initiation.

    ronaldanthonylewis
    Published:  October 1, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:16 AM PDT Read More See more Security
  • Improve application design with prototyping, modeling, and storyboarding
    Hardware

    Improve application design with prototyping, modeling, and storyboarding

    Meeting client expectations is the number-one goal of application development. Here's how one developer uses three approaches to handle different aspects of this critical objective.

    ronaldanthonylewis
    Published:  September 9, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:12 AM PDT Read More See more Hardware
  • 1
  • 2
  • Next
11 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice