Local cover image
Local cover image

Writing secure code : practical strategies and proven techniques for building secure applications in a networked world

By: Contributor(s): Material type: TextTextPublication details: Redmond : Microsoft Press, c2003Edition: 2a edDescription: xxviii, 768 p. : il. ; 23 cmSubject(s):
Contents:
Introduction -- Part I: Contemporary Security -- Chapter 1: The Need for Secure Systems -- Chapter 2: The Proactive Security Development Process -- Chapter 3: Security Principles to Live By -- Chapter 4: Threat Modeling -- Part II: Secure Coding Techniques -- Chapter 5: Public Enemy #1: The Buffer Overrun -- Chapter 6: Determining Appropriate Access Control -- Chapter 7: Running with Least Privilege -- Chapter 8: Cryptographic Foibles -- Chapter 9: Protecting Secret Data -- Chapter 10: All Input Is Evil! -- Chapter 11: Canonical Representation Issues -- Chapter 12: Database Input Issues -- Chapter 13: Web-Specific Input Issues -- Chapter 14: Internationalization Issues -- Part III: Even More Secure Coding Techniques -- Chapter 15: Socket Security -- Chapter 16: Securing RPC, ActiveX Controls, and DCOM -- Chapter 17: Protecting Against Denial of Service Attacks -- Chapter 18: Writing Secure .NET Code -- Part IV: Special Topics -- Chapter 19: Security Testing -- Chapter 20: Performing a Security Code Review -- Chapter 21: Secure Software Installation -- Chapter 22: Building Privacy into Your Application -- Chapter 23: General Good Practices -- Chapter 24: Writing Security Documentation and Error Messages -- Part V: Appendixes -- Appendix A: Dangerous APIs -- Appendix B: Ridiculous Excuses We’ve Heard -- Appendix C: A Designer’s Security Checklist -- Appendix D: A Developer’s Security Checklist -- Appendix E: A Tester’s Security Checklist -- Annotated Bibliography -- Index
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Call number Status Date due Barcode
Libro Libro Biblioteca de la Facultad de Informática K.6.5 HOW (Browse shelf(Opens below)) Available DIF-04036

Incluye índice y bibliografía.

Introduction -- Part I: Contemporary Security -- Chapter 1: The Need for Secure Systems -- Chapter 2: The Proactive Security Development Process -- Chapter 3: Security Principles to Live By -- Chapter 4: Threat Modeling -- Part II: Secure Coding Techniques -- Chapter 5: Public Enemy #1: The Buffer Overrun -- Chapter 6: Determining Appropriate Access Control -- Chapter 7: Running with Least Privilege -- Chapter 8: Cryptographic Foibles -- Chapter 9: Protecting Secret Data -- Chapter 10: All Input Is Evil! -- Chapter 11: Canonical Representation Issues -- Chapter 12: Database Input Issues -- Chapter 13: Web-Specific Input Issues -- Chapter 14: Internationalization Issues -- Part III: Even More Secure Coding Techniques -- Chapter 15: Socket Security -- Chapter 16: Securing RPC, ActiveX Controls, and DCOM -- Chapter 17: Protecting Against Denial of Service Attacks -- Chapter 18: Writing Secure .NET Code -- Part IV: Special Topics -- Chapter 19: Security Testing -- Chapter 20: Performing a Security Code Review -- Chapter 21: Secure Software Installation -- Chapter 22: Building Privacy into Your Application -- Chapter 23: General Good Practices -- Chapter 24: Writing Security Documentation and Error Messages -- Part V: Appendixes -- Appendix A: Dangerous APIs -- Appendix B: Ridiculous Excuses We’ve Heard -- Appendix C: A Designer’s Security Checklist -- Appendix D: A Developer’s Security Checklist -- Appendix E: A Tester’s Security Checklist -- Annotated Bibliography -- Index

Click on an image to view it in the image viewer

Local cover image