877.791.9571 |

About the Author:

Adrian Stolarski is a freelance security tech blogger, specializing in Java, PHP, and JQuery. In his own words, he does the hard work of training the unemployed. Currently, he handles Evaluation Visualization for real-time systems with XWT and Eclipse RAP. If he sees that something works, he asks how it works and why it works, then sets out to make it work better. A researcher for InfoSec Institute, he currently lives in Poland, but plans to move to London.
projects

Estimating Projects, Part II

For part 1 of this series, please click here.

In the first part, our discussion of the estimation focused primarily on the general principles of creating any type of estimate. […]

projects

Estimating Projects, Part I

Each of us who has ever worked in any programming project has had to deal with one of the biggest problems we face when creating projects. It is, of […]

hr-sales-leads

Human Resource Management in Agile – Part 6

For part 5 of this series, please click here.

Here’s another article on human resource management. We will work in the efficiency aspect and introduce elements of discipline in Agile. […]

hr-sales-leads

Human Resource Management in Agile – Part 5

As I mentioned in a previous article, it is time to return to human resource management. We will focus here on the re-generation of projects in teams. But first, […]

Online-Privacy

Preparing to Collect Information about People and Businesses

Nowadays, a more and more serious crime is identity theft. While in Eastern European countries and former the Soviet block most people are suspicious, in Western Europe or America, […]

software-piracy

Software Piracy – An Attempt to Assess the Problem

In many countries we are dealing with two very serious problems. These are copyright and piracy. I would like in this article to look a little closer at these […]

image_4

Introduction to Electronic Certificates – Part II

In this article we will be discussing the generation of X.509 certificates. We will learn the companies that offer them. In addition, we will cover the basics of security […]

image_4

Introduction to Electronic Certificates – Part 1

As we all know, our e-mail messages can be viewed, modified and censored in thousands of places that are located between the sender and the receiver, and this practice […]

programming

Good Programming Techniques, Part 1: Exceptions

Good Programming Techniques, Part 1: Exceptions

In a previous article related to good software development techniques, we learned SOLID principles and three-layer architecture. For the three-tier architecture, of course, we […]

programming

Creating a Professional Application – How to Create Tests, Part 5

This article is a continuation of the previous four, for creating good software. We previously touched on unit tests and functional tests and test categorizing all possible applications. Unfortunately, […]

Eco-Friendly-Programming-695x465

Creating a Professional Application: How to Create Tests, Part 4

In previous articles, we discussed the classification of application testing and unit testing grounds. We also introduced mock objects and stubs. Today’s article was a challenge for me personally […]

javascript-programming

Creating a Professional Application: How to Create Tests, Part 3

I decided to change a little chronology of the documents. Although this part was supposed to be dedicated to testing frameworks, I decided to devote it to an introduction […]

holscipres.045

Good Programming Techniques – S.O.L.I.D. and Three-layer Architecture

A lot of people wonder how to approach writing code. So I decided to write on this topic in a few articles. Here’s the first one, I hope that […]

Computer-Programming

Creating a Professional Application – How to Create Tests Part 2

After the first stage it was time for step two. What can I say? Here is a further classification of software testing methods. First, get to know the theory, […]

2895380_COM_best_programming_language

Creating a Professional Application – How to Create Tests Part 1

Have you ever wondered what in general the process of testing is? I do not mean just penetration testing, but also testing the code and applications for various shortcomings. […]

3d human with key and locker in hands

Introduction to Controlling the Integrity of the File System

Do you remember my article about physical security? If so, this article can be seen as its development. If there it is more focused on the security of an […]

shutterstock-password-key

Best Practices When Creating Passwords

I understand perfectly well that the InfoSec website has often discussed the use of good algorithms for hashing passwords. But these articles were usually very vague. So in this […]

1320897582_Hiring

Human Resource Management in Agile – Part 4

In the previous parts of our discussion we focused on internal team building and communication within the team and self-motivation. Today we will go on. We’ll talk about how […]

People_networking_a_

Human Resource Management in Agile – Part 3

In a previous article we discussed how we can build a good team, composed of professionals. We got to know the ins and outs of good feedback. Now we […]

hr-sales-leads

Human Resource Management in Agile – Part 2

Part one of this article series can be found here: Human Resource Management in Agile Part 2.

From the previous article you could find out what mistakes you make when […]