Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Software Vulnerability Guide (Programming Series)

Buy
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet. Most of these security bugs (and the viruses, worms, and exploits that derive from them) started out as programmer mistakes. With this easy-to-use guide, professional programmers and testers will learn how to recognize and prevent these vulnerabilities before their software reaches the market. For each of the 30 common software vulnerabilities featured the authors provide a summary, description of how the vulnerability occurs, and famous examples of how it has been used. Tips on how to find and fix the vulnerability in software are also provided along with source code snippets, commentary, tools, and techniques in easy-to-read sidebars. This guide is a must-have for today’s software developers.

KEY FEATURES

* Includes coding examples in a variety of languages, including C, C++, Java, VB, .NET, scripting languages, and more
* Provides tips for uncovering vulnerabilities in a diverse array of systems, including what it may look like in code, and how the offending code can be fixed
* Covers vulnerabilities such as permitting default or weak passwords, cookie poisoning, exchanging sensitive data in plain text, leaving things in memory, and format string attacks
* Includes a CD-ROM with all of the source code, as well as many freeware/shareware tools discussed in the book

About the Author

Herbert Thomas is the Director of Security Technology at Security Innovation LLC and serves on the graduate faculty of the Florida Institute of Technology. He is the co-author of How to Break Sofware Security: Effective Techniques for Security Testing and is a frequent speaker at industry conferences. Scott Chase is a Security Architect at SI Government Solutions, where he manages key research projects for the US government. He has also worked as a university researcher in information security and as a software tester in industry.

(HTML tags aren't allowed.)

Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

UML for Database Design
UML for Database Design

The Unified Modeling Language (UML), the standard graphical notation for modeling business and software application needs, has emerged as an effective modeling tool for database design. When used as a common modeling language for the many facets of system development, the UML can serve as a unifying framework that facilitates...


Windows 95 in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))
Windows 95 in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

Windows 95 in a Nutshell is a comprehensive, compact reference that systematically unveils what serious users of Windows 95 will find interesting and useful. Little known details of the operating system, utility programs, and configuration settings are all captured in a consistent reference format.This is the first book in...

Photographic Lighting: Essential Skills, Fourth Edition (Photography Essential Skills)
Photographic Lighting: Essential Skills, Fourth Edition (Photography Essential Skills)
This book is fantastic! ...The terminology is easy to understand and techniques are explained in a no nonsense format. Excellent for beginners to intermediate photographers. I have had this book for a few months now and through practicing and completing the revision exercises, I have a better understanding of the techniques used for photograhic...
Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy