Writing Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World. (Record no. 13533)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01961nam a2200253#a 4500 |
001 - CONTROL NUMBER | |
control field | vtls000019991 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230822s2003 xx 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0735617228 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | JPS |
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | COMP 62.4 681.3 HOW |
003 - CONTROL NUMBER IDENTIFIER | |
control field | JPS |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Howard, Michael |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Writing Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World. |
250 ## - EDITION STATEMENT | |
Edition statement | Second Edition |
260 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Redmond, Washington : |
Name of producer, publisher, distributor, manufacture | Microsoft Press, |
Date of production, publication, distribution, manufacture | 2003 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 768p,illust,23cm |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist. |
546 ## - LANGUAGE NOTE | |
Language note | eng |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
650 20 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science) |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | LeBlanc, David |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Monograf |
990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA] | |
Link information for 9XX fields | 2003 |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
General Collections | JPS HQ Library | JPS HQ Library | Main Library | 22/08/2023 | COMP 62.4 681.3 HOW | 1000025725 | 22/08/2023 | 22/08/2023 | Monograf |