An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
Secure Coding in C and C++ (2nd Edition) (SEI Series in Software Engineering)
 
 

Secure Coding in C and C++ (2nd Edition) (SEI Series in Software Engineering) [Kindle Edition]

Robert C. Seacord

Kindle-Preis: EUR 18,74 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 18,74  
Taschenbuch EUR 40,90  


Produktbeschreibungen

Kurzbeschreibung

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

 

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities.

 

Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow’s attacks, not just today’s. Drawing on the CERT’s reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

 

Coverage includes technical detail on how to

  • Improve the overall security of any C or C++ application
  • Thwart buffer overflows, stack-smashing, and return-oriented programming attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors
  • Perform secure I/O, avoiding file system vulnerabilities
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid race conditions and other exploitable vulnerabilities while developing concurrent code

 

The second edition features

  • Updates for C11 and C++11
  • Significant revisions to chapters on strings, dynamic memory management, and integer security
  • A new chapter on concurrency
  • Access to the online secure coding course offered through Carnegie Mellon’s Open Learning Initiative (OLI)

 

Secure Coding in C and C++, Second Edition, presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you’re responsible for creating secure C or C++ software–or for keeping it safe–no other book offers you this much detailed, expert assistance.

 

Über den Autor und weitere Mitwirkende

Robert C. Seacord is currently the Secure Coding Technical Manager in the CERT Program of Carnegie Mellon's Software Engineering Institute (SEI). He is the author or coauthor of five books, including The CERT(r) C Secure Coding Standard (Addison-Wesley, 2009), and is the author and instructor of a video training series, Professional C Programming LiveLessons, Part I: Writing Robust, Secure, Reliable Code (Addison-Wesley, 2013).

Produktinformation


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.6 von 5 Sternen  10 Rezensionen
12 von 12 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Should be called 'Secure Coding in C' 10. Oktober 2013
Von mdub - Veröffentlicht auf Amazon.com
Format:Taschenbuch
As a C++ application developer, this book is simply not what I excpected. Most of the security issues surround the use of C API and C-style programming. The C++ parts are skimpy and often presented as safer alternatives.

Still, there is a lot of interesting stuff here. I like that each chapter goes into a lot of detail explaining how things work (stack, heap, file systems, etc) before the security holes are presented. On the other hand the chapter on threads include little more than an explenantion of how threads work and synchronize.

Overall great for C programmers, but not really for those that already embrace the C++ programming style (std::string, RAII/smart ptrs , iostreams, boost thread/filesystem, etc)
5 von 5 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great book for both beginner and advanced coders 13. Mai 2013
Von Michael - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This is a great book that should be required reading for anyone interested in learning how to exploit vulnerable code and secure their C and C++ programs. This book covers a variety of topics going in depth on how to exploit vulnerable programs, describing important case studies, and securing code. Seacord provides excellent explanations for how and why C and C++ programs are so easily vulnerable to attack as well as the solutions to these vulnerabilities.

A new C/C++ programmer might find the field of hacking, bug fixes, and computer security to be quite intimidating. Writing code that is secure against security exploits can be quite difficult because of the seemingly unlimited number of ways an attacker can exploit code. Seacord's new book is exceptional because of the thoroughness with which the book covers all topics including security holes, history, and consequences of being attacked.

While reading through this book, one point that surprised me was that even perfectly reasonable code can be easily exploitable code when seen through the eyes of a malicious attacker. Many of these problems occur because of the way in which C is designed, trusting the coder to make the correct decisions in favor of fast performance. Unfortunately, new programers cannot know what the correct decision is unless they have studied the problem of attacking and securing code. This book is great material for anyone who wants to learn how to see code through the eyes of an attacker and also to defend against malicious code. This book should definitely be required reading for anyone interested in securing their C code as well as learning how attackers exploit code.
7 von 8 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Required reading for anyone who codes in C or C++ 7. Mai 2013
Von Ben Rothke - Veröffentlicht auf Amazon.com
Format:Taschenbuch
Behind nearly every security vulnerability is poorly written or insecure code. Fix the code and a majority of the security vulnerabilities go away.

In the just released 2nd edition of Secure Coding in C and C++, author Robert Seacord of CERT has created an invaluable resource for developers.

Research from OWASP and CERT shows that a lion's share of core vulnerabilities can be found in a small number of root causes. In the book, Seacord tackles those root causes.

Like a good programmer, the book is methodical and details all of the core areas which can lead to security vulnerabilities. The book shows how they are exploited and how they can be fixed.

The average C programmer knows about buffer overflows, authentication, format strings and more. But if they don't know how to write secure code, they will invariably write insecure code.

Aside from the inherent security and privacy benefits, there is significant cost savings to writing secure code.

For anyone who codes in C or C++, Secure Coding in C and C++ should be required reading.
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An excellent text on coding to create "hacker-proof" software... 8. Oktober 2013
Von Michael Reeves - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This is an excellent text offering an overview of all the various ways that programmers leave holes in their software that malicious hackers (Black Hat Hackers) can use to attack software. The simple examples demonstrate how a malicious hacker would write code to attack your system, and infiltrate your systems to gather information for criminal activity or use.

The author includes suggestions and examples of how to avoid programming these types of vulnerabilities into your software projects.

In today's age, more often than not, fixing "bugs" in programs is based on the business model of a Return-On-Investment (ROI). As a result, coding vulnerabilities are often left in place to avoid the expense and time required to track issues, re-code, and test the software.

Unfortunately, after reading this text, I realize that the problems didn't start with the business model, but with how programmers are trained. Beginning students of programming are not made aware of the concerns presented in this text, and how to correct for them until much later, IF at all, in their training.

As a result, students will form bad-habits in their coding paradigm that this text addresses.

This text or similar needs to be a mandate for beginning programmers. I, certainly, wish that my professors and mentors had brought the topics contained in this book to my attention as a beginning student in the field.

This text has a permanent place in my library.

Respectfully,

MJR
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good Orientation on Secure Coding 30. August 2013
Von Anonymous Customer - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This is a good start into thinking more securely as a programmer. I think it's important knowledge if you regularly program in C/C++. Everyone who's used the language knows that "pointers can get you into trouble," but knowing exactly what can be used against your lack of oversight is a much more concrete motivation to pay attention. If you're one of those punk kids who always wants to know why you follow proper practices, read it. These languages give you freedom under the assumption you know what you're doing, and this book definitely helps.

That said, I think while its initial impact is significant, it's value drops significantly after the first read, as its lessons are more philosophical than a reference. Unless you're loaning it out to punk kids you work with who need to stop recklessly managing memory. If you or someone you know thinks C is anything but a cold harsh mistress with no more attachment to you than your goldfish, this book is probably for you.

An intermediate knowledge of a C language is necessary, although I'd say memory of irresponsible design decisions helps reinforce the material better.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden