Ronald J. Leach

About Ron Leach

I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems.

As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists. More than 3,500 people have attended my lectures on identity theft; many others have seen them on closed-circuit television.

I have written more than twenty books, and more than 120 technical articles. I was the editor or co-editor of the Maryland Genealogical Society Journal for many years.

Books by Ronald J. Leach

Using C in Software Design

Using C in Software Design, Second Edition

Advanced Topics in UNIX

Advanced Topics in UNIX, Second Edition

The 101 Most Important UNIX and Linux Commands

Software Reuse: Methods, Models, Costs

Software Reuse: Methods, Models, Costs, Second Edition

Fastest Paths to a Job in the Computer Industry

Object-Oriented Design and Programming in C++

Introduction to Software Engineering

Data Recovery

Identity Theft in the Cyber Age

Twelve and a Half Steps to Avoid Identity Theft

Introduction to Software Engineering

Introduction to Software Engineering, Second Edition (2016)

The Bible as a Manual for Identity Theft

Recovering from Identity Theft

Medical Identity Theft (2017)

Relative Genealogy

Genealogy for the Information Age

Why 2K?

Eat Kids At School

Secrets of Pricing Your eBook