Writing secure code : practical strategies and proven techniques for building secure applications in a networked world
Material type:
Item type | Home library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Biblioteca de la Facultad de Informática | K.6.5 HOW (Browse shelf(Opens below)) | Available | DIF-04036 |
Browsing Biblioteca de la Facultad de Informática shelves Close shelf browser (Hides shelf browser)
Incluye índice y bibliografía.
Introduction -- Part I: Contemporary Security -- Chapter 1: The Need for Secure Systems -- Chapter 2: The Proactive Security Development Process -- Chapter 3: Security Principles to Live By -- Chapter 4: Threat Modeling -- Part II: Secure Coding Techniques -- Chapter 5: Public Enemy #1: The Buffer Overrun -- Chapter 6: Determining Appropriate Access Control -- Chapter 7: Running with Least Privilege -- Chapter 8: Cryptographic Foibles -- Chapter 9: Protecting Secret Data -- Chapter 10: All Input Is Evil! -- Chapter 11: Canonical Representation Issues -- Chapter 12: Database Input Issues -- Chapter 13: Web-Specific Input Issues -- Chapter 14: Internationalization Issues -- Part III: Even More Secure Coding Techniques -- Chapter 15: Socket Security -- Chapter 16: Securing RPC, ActiveX Controls, and DCOM -- Chapter 17: Protecting Against Denial of Service Attacks -- Chapter 18: Writing Secure .NET Code -- Part IV: Special Topics -- Chapter 19: Security Testing -- Chapter 20: Performing a Security Code Review -- Chapter 21: Secure Software Installation -- Chapter 22: Building Privacy into Your Application -- Chapter 23: General Good Practices -- Chapter 24: Writing Security Documentation and Error Messages -- Part V: Appendixes -- Appendix A: Dangerous APIs -- Appendix B: Ridiculous Excuses We’ve Heard -- Appendix C: A Designer’s Security Checklist -- Appendix D: A Developer’s Security Checklist -- Appendix E: A Tester’s Security Checklist -- Annotated Bibliography -- Index