libcats.org
Главная

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Обложка книги 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

, ,

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive

Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

  • SQL injection
  • Web server- and client-related vulnerabilities
  • Use of magic URLs, predictable cookies, and hidden form fields
  • Buffer overruns
  • Format string problems
  • Integer overflows
  • C++ catastrophes
  • Insecure exception handling
  • Command injection
  • Failure to handle errors
  • Information leakage
  • Race conditions
  • Poor usability
  • Not updating easily
  • Executing code with too much privilege
  • Failure to protect stored data
  • Insecure mobile code
  • Use of weak password-based systems
  • Weak random numbers
  • Using cryptography incorrectly
  • Failing to protect network traffic
  • Improper use of PKI
  • Trusting network name resolution
EPUB | FB2 | MOBI | TXT | RTF
* Конвертация файла может нарушить форматирование оригинала. По-возможности скачивайте файл в оригинальном формате.
Популярные книги за неделю:

Ключ к сверхсознанию

Автор:
Категория: Путь к себе
Размер книги: 309 Kb

Древо жизни

Автор:
Категория: Путь к себе
Размер книги: 1.70 Mb

Здоровье надо созидать

Автор:
Категория: Здоровье
Размер книги: 363 Kb

The Meme Machine

Автор:
Категория: psychology, memetics, sociology
Размер книги: 1.72 Mb
Только что пользователи скачали эти книги:

Химия окружающей среды

Автор:
Размер книги: 5.53 Mb

А.А. Микулин Активное долголетие

Автор:
Категория: people
Размер книги: 959 Kb

Mind Guest

Автор:
Категория: fiction
Размер книги: 485 Kb

Quell der Träume

Автор:
Категория: fiction
Размер книги: 515 Kb

Il Sangue Versato

Автор:
Категория: fiction
Размер книги: 950 Kb

Die drei ??? Toteninsel

Автор: , Автор: , Автор:
Категория: fiction
Размер книги: 1.30 Mb

Planet der Mythen

Автор:
Категория: fiction
Размер книги: 286 Kb

Als die Welt still stand

Автор:
Категория: fiction
Размер книги: 3.57 Mb