Writing Secure Code

Nonfiction, Computers, Programming, Software Development
Cover of the book Writing Secure Code by David LeBlanc, Michael Howard, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: David LeBlanc, Michael Howard ISBN: 9780735637405
Publisher: Pearson Education Publication: December 4, 2002
Imprint: Microsoft Press Language: English
Author: David LeBlanc, Michael Howard
ISBN: 9780735637405
Publisher: Pearson Education
Publication: December 4, 2002
Imprint: Microsoft Press
Language: English

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.

More books from Pearson Education

Cover of the book Properties of Concrete by David LeBlanc, Michael Howard
Cover of the book Virtualizing Desktops and Apps with Windows Server 2012 R2 Inside Out by David LeBlanc, Michael Howard
Cover of the book Audience, Relevance, and Search by David LeBlanc, Michael Howard
Cover of the book Easystart: The Troy Stone by David LeBlanc, Michael Howard
Cover of the book Adobe Creative Suite 5 Web Premium How-Tos by David LeBlanc, Michael Howard
Cover of the book JavaFX Rich Client Programming on the NetBeans Platform by David LeBlanc, Michael Howard
Cover of the book Marketing Management by David LeBlanc, Michael Howard
Cover of the book Developing Flex 4 Components by David LeBlanc, Michael Howard
Cover of the book Be Creative – Now! by David LeBlanc, Michael Howard
Cover of the book From Mathematics to Generic Programming by David LeBlanc, Michael Howard
Cover of the book How To Talk Finance by David LeBlanc, Michael Howard
Cover of the book Computer Structure and Logic by David LeBlanc, Michael Howard
Cover of the book The Analytic Hierarchy Process (AHP) in Software Development (Digital Short Cut) by David LeBlanc, Michael Howard
Cover of the book Understanding What Financial Help You Need by David LeBlanc, Michael Howard
Cover of the book The Rules of Love by David LeBlanc, Michael Howard
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy