000 01961nam a2200253#a 4500
001 vtls000019991
008 230822s2003 xx 000 0 eng d
020 _a0735617228
040 _aJPS
090 0 0 _aCOMP 62.4 681.3 HOW
100 _aHoward, Michael
_eauthor
245 0 _aWriting Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World.
250 _aSecond Edition
260 _aRedmond, Washington :
_bMicrosoft Press,
_c2003
300 _a768p,illust,23cm
505 _aPart I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist.
546 _aeng
650 1 0 _aComputer security
650 2 0 _aData encryption (Computer science)
700 _aLeBlanc, David
942 _cMONO
990 _a2003
999 _a09344
_aVIRTUA
_aVTLSSORT0030*0050*0080*0200*0390*0900*1000*2450*2500*2600*3000*5050*5460*6500*6501*7000*9020*9050*9900*9980*9990*9991*9992
_c13533
_d13533
003 JPS