000 | 01961nam a2200253#a 4500 | ||
---|---|---|---|
001 | vtls000019991 | ||
008 | 230822s2003 xx 000 0 eng d | ||
020 | _a0735617228 | ||
040 | _aJPS | ||
090 | 0 | 0 | _aCOMP 62.4 681.3 HOW |
100 |
_aHoward, Michael _eauthor |
||
245 | 0 | _aWriting Secure Code: Practical Strategies and Techniques for Secure Application Coding in a Networked World. | |
250 | _aSecond Edition | ||
260 |
_aRedmond, Washington : _bMicrosoft Press, _c2003 |
||
300 | _a768p,illust,23cm | ||
505 | _aPart I Contemporary Security. 1 The Need for Secure Systems. 2 The Proactive Security Development Process. 3 Security Principles to Live By. 4 Threat Modeling. Part II Secure Coding Techniques. 5 Public Enemy#1: The Buffer Overrun. 6 Determining Appropriate Access Control. 7 Running with Least Privilege. 8 Cryptographic Foibles. 9 Protecting Secret Data. 10 All Input Is Evil!. 11 Canonical Representation Issues. 12 Database Input Issues. 13 Web-Specific Input Issues. 14 Internationalization Issues. Part III Even More Secure Coding Techniques. 15 Socket Security. 16 Securing RPC, Active Controls, and DCOM. 17 Protecting Against Denial of Service Attacks. 18 Writing Secure.Net Code. Part IV Special Topics. 19 Security Testing. 20 Performing a Security Code Review. 21 Secure Software Installation. 22 Building Privacy into Your Application. 23 General Good Practices. 24 Writing Security Documentation and Erroe Messages. Part V Appendixes A Dangerous APIs. B Ridiculous Excuses We've Heard. C A Designer's Security Checklist. D A Developer's Security Checklist. E A Tester's Security Checklist. | ||
546 | _aeng | ||
650 | 1 | 0 | _aComputer security |
650 | 2 | 0 | _aData encryption (Computer science) |
700 | _aLeBlanc, David | ||
942 | _cMONO | ||
990 | _a2003 | ||
999 |
_a09344 _aVIRTUA _aVTLSSORT0030*0050*0080*0200*0390*0900*1000*2450*2500*2600*3000*5050*5460*6500*6501*7000*9020*9050*9900*9980*9990*9991*9992 _c13533 _d13533 |
||
003 | JPS |