Ronald J. Leach

About Ron Leach

I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems.

As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists. More than 3,500 people have attended my lectures on identity theft; many others have seen them on closed-circuit television.

I have written more than twenty books, and more than 120 technical articles. I was the editor or co-editor of the Maryland Genealogical Society Journal for many years.

Books by Ronald J. Leach

Using C in Software Design

Using C in Software Design, Second Edition

Advanced Topics in UNIX

Advanced Topics in UNIX, Second Edition

The 101 Most Important UNIX and Linux Commands

Software Reuse: Methods, Models, Costs

Software Reuse: Methods, Models, Costs, Second Edition

Fastest Paths to a Job in the Computer Industry

Object-Oriented Design and Programming in C++

Introduction to Software Engineering

Data Recovery

Identity Theft in the Cyber Age

Twelve and a Half Steps to Avoid Identity Theft

Introduction to Software Engineering

Introduction to Software Engineering, Second Edition (2016)

The Bible as a Manual for Identity Theft

Recovering from Identity Theft

Medical Identity Theft (2017)

Relative Genealogy

Genealogy for the Information Age

Why 2K?

Eat Kids At School

Secrets of Pricing Your eBook

Popular items by Ronald J. Leach

View all offers