Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
19 Deadly Sins of Software Security (Security One-off)

Buy

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes:

  • Windows, UNIX, Linux, and Mac OS X
  • C, C++, C#, Java, PHP, Perl, and Visual Basic
  • Web, small client, and smart-client applications
In early 2004, Amit Yoran, then the director of the National Cyber Security Division at the U.S. Department of Homeland Security, announced that about 95 percent of software security bugs come from 19 “common, well-understood” programming mistakes. We are not going to insult your intelligence and explain the need for secure software in today’s interconnected world—we assume you know the reasons—but we will outline how to find and remedy these common security defects in your code.

The worrisome thing about security defects is they are really easy to make, and the results of a very simple one-line error can be catastrophic. The coding defect that led to the Blaster worm was two lines long.

If there is only one bit of wisdom we can offer you, it’s this: “No programming language or platform will make your software secure for you. Only you can do that.” There is a lot of literature on creating secure software, and the authors of this book have written some of the most influential material, but there is a need for a small, easy-to-read, pragmatic book on the subject that covers all the bases quickly.

When writing this book, we stuck by a simple set of rules to keep it pragmatic:

  • Keep it simple. We didn’t focus on unnecessary drivel. There are no war stories, no funny anecdotes; it’s just the pertinent facts. You probably just want to get your job done, and wish to make your code as a good as possible in the shortest amount of time; hence we kept the book simple so you can refer to it rapidly and get the facts you need.

  • Keep it short. A follow-on from the previous point: by focusing on the facts, and nothing else, we were able to keep the book short. In fact, we’ll keep this introduction short too.

  • Make it cross platform. The Internet is a complex place, with myriads of interconnected computing devices running different operating systems and written using many programming languages. We wanted to make this book appeal to all developers, so the examples in this book apply to most operating systems.

  • Make it cross language. A follow-on from the previous point: most examples apply to different languages, and we show plenty of security defects in numerous languages throughout the book.

(HTML tags aren't allowed.)

Applied Oracle Security: Developing Secure Database and Middleware Environments
Applied Oracle Security: Developing Secure Database and Middleware Environments

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Windows Server 2003 Network Administration
Windows Server 2003 Network Administration

This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and...


Lighttpd
Lighttpd

LightTPD is a secure, flexible, and most importantly, light web server designed and optimized for high performance environments. It is open-source and licensed under the revised BSD license. Its event-driven architecture optimized for a large number of parallel connections, its advanced features (FastCGI, CGI, Auth, Output Compression, URL...

Head First Servlets and JSP: Passing the Sun Certified Web Component Developer Exam (Brain-Friendly Guides)
Head First Servlets and JSP: Passing the Sun Certified Web Component Developer Exam (Brain-Friendly Guides)
Looking to study up for the new J2EE 1.5 Sun Certified Web Component Developer (SCWCD) exam?

This book will get you way up to speed on the technology you'll know it so well, in fact, that you can pass the brand new J2EE 1.5 exam. If that's what you want to do, that is. Maybe you don't care about the exam, but need to use servlets
...
Mixed Integer Nonlinear Programming (The IMA Volumes in Mathematics and its Applications)
Mixed Integer Nonlinear Programming (The IMA Volumes in Mathematics and its Applications)

Many engineering, operations, and scientific applications include a mixture of discrete and continuous decision variables and nonlinear relationships involving the decision variables that have a pronounced effect on the set of feasible and optimal solutions. Mixed-integer nonlinear programming (MINLP) problems combine the numerical...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy