Writing Secure Code
Hackers cost businesses countless dollars and cause developers endless worry every year as they attack networked applications, steal credit-card numbers, deface Web sites, hide back doors and worms, and slow network traffic to a crawl. Keep the bad guys at bay with the tips and techniques in this entertaining, eye-opening book. You'll learn how to padlock your applications throughout the entire development process - from designing secure applications, to writing robust code that can withstand repeated attacks, to testing applications for security flaws. Short, easily digested chapters reveal proven security principles, strategies, and coding techniques to give you the peace of mind that comes from knowing you've done everything you can to make your code not only fast, but hacker-proof. The authors - two battle-scarred veterans who have solved some of the toughest security problems in the industry - also give you sample code in numerous languages to demonstrate the specifics of secure development. If you build networked applications and you care about the security of your product, you need this book.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Need for Secure Systems
Designing Secure Systems
the Buffer Overrun
21 other sections not shown
Other editions - View all
access control ACLs administrator allow application attacker authentication BOOL buffer overrun bytes canonicalization Chapter char characters ciphertext client companion CD component configuration create cross-site scripting cryptographic database DCOM debug decrypt default determine DWORD e-mail encryption error example fail feature filename firewall folder Secureco\Chapter function GetLastError hash interface Internet IPSec issues JScript look malicious Microsoft Microsoft Windows mitigate named pipes NULL DACL object operating system option packet password perform Perl plaintext Pocket PC port privilege problem protocol random regular expression request require resource restricted token sample code script secret data server sizeof socket Storing Secrets strcpy stream ciphers string template threat tion tool Unicode user input user's username valid void vulnerability Web server Web-based Windows NT Windows XP write
All Book Search results »
J2EE Security for Servlets, EJBs and Web Services: Applying Theory and ...
Limited preview - 2004