Writing Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World.
Material type: TextPublication details: Redmond, Washington : Microsoft Press, 2003Edition: Second EditionDescription: 768p,illust,23cmISBN:- 0735617228
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Monograf | JPS HQ Library Main Library | General Collections | COMP 62.4 681.3 HOW (Browse shelf(Opens below)) | Available | 1000025725 |
Browsing JPS HQ Library shelves, Shelving location: Main Library, Collection: General Collections Close shelf browser (Hides shelf browser)
COMP 62.1 681.3 STO THE NETWORK STARTER KIT | COMP 62.3 681.3 RKS Rangkaian Kawasan Setempat: Kenali LAN - Perancangan, Penyediaan dan Pemasangannya. | COMP 62.3 681.3 SEC Security+Certification Training Kit. | COMP 62.4 681.3 HOW Writing Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World. | COMP 62.4 681.3 MCC Hacking Exposed: Network Security Secrets & Solutions. | COMP 62.5.1 681.3 BUI Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication:patterns & Practices. | COMP 62.5 681.3 DUT Microsoft ASP.NET Step By Step [CD Included] |
Part I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist.
eng
There are no comments on this title.