Amazon cover image
Image from Amazon.com

Writing Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World.

By: Contributor(s): Material type: TextTextPublication details: Redmond, Washington : Microsoft Press, 2003Edition: Second EditionDescription: 768p,illust,23cmISBN:
  • 0735617228
Subject(s):
Contents:
Part I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Monograf JPS HQ Library Main Library General Collections COMP 62.4 681.3 HOW (Browse shelf(Opens below)) Available 1000025725

Part I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist.

eng

There are no comments on this title.

to post a comment.

HUBUNGI KAMI

Perpustakaan Jabatan Pengairan dan Saliran Malaysia (JPS Malaysia)
Aras Bawah, Blok A, Kompleks Ibu Pejabat JPS Malaysia
Persiaran Rimba Permai, Cyber 8
63000 Cyberjaya, Selangor

No Tel : 03 – 2697 3050

Emel : adminlibrary@water.gov.my

MEDIA SOSIAL


KAUNTER PELAWAT

HARI INI MINGGU LEPAS BULAN LEPAS TAHUN LEPAS JUMLAH
today lastweek lastmonth lastyear total

WAKTU PERKHIDMATAN

   Isnin - Khamis  :  8.00 pagi – 5.00 petang
   Jumaat  :  8.00 pagi – 12.15 tengah hari
     2.45 petang - 5.00 petang

   Sabtu, Ahad & Cuti Umum: TUTUP


Paparan terbaik menggunakan Google Chrome dan mozila firefox dengan resolusi 1600 X 900
Hakcipta Terpelihara @2023, Perpustakaan JPS Malaysia
Penafian :Kerajaan Malaysia dan Pihak Jabatan Pengairan dan Saliran Malaysia tidak bertanggungjawab terhadap sebarang kerugian atau kerosakan yang dialami kerana menggunakan maklumat dalam portal ini.

Powered by Koha