Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Den Autoren folgen
Alle anzeigenOK
19 Deadly Sins of Software Security Taschenbuch – 16. Juli 2005
This essential book for all software developers--regardless of platform, language, or type of application--outlines the 19 deadly sins of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes:
- Windows, UNIX, Linux, and Mac OS X
- C, C++, C#, Java, PHP, Perl, and Visual Basic
- Web, small client, and smart-client applications
- Seitenzahl der Print-Ausgabe304 Seiten
- SpracheEnglisch
- HerausgeberMcGraw-Hill Education Ltd
- Erscheinungstermin16. Juli 2005
- Abmessungen18.42 x 1.91 x 22.23 cm
- ISBN-100072260858
- ISBN-13978-0072260854
Produktbeschreibungen
Buchrückseite
Ninety-five percent of software bugs are caused by the same 19 programming flaws. Amit Yoran, Former Director of The Department of Homeland Security's National Cyber Security Division
Secure your software by eliminating code vulnerabilities from the start. This essential book for all software developers--regardless of platform, language, and type of application--outlines the 19 sins of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to write secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this hands-on guide. Detailed code examples throughout show the code defects as well as the fixes and defenses. If you write code, you need this book. Eliminate these security flaws from your code:
- Buffer overruns
- Format string problems
- Integer overflows
- SQL injection
- Command injection
- Failure to handle errors
- Cross-site scripting
- Failure to protect network traffic
- Use of magic URLs and hidden forms
- Improper use of SSL
- Use of weak password-based systems
- Failure to store and protect data securely
- Information leakage
- Trusting network address resolution
- Improper file access
- Race conditions
- Unauthenticated key exchange
- Failure to use cryptographically strong random numbers
- Poor usability
Michael Howard, CISSP, is an architect of the security process changes at Microsoft and a co-author of Processes to Produce Secure Software published by the Department of Homeland Security's National Cyber Security Division. He is a Senior Security Program Manager in the Security Engineering Group at Microsoft Corporation and co-author of Writing Secure Code (Microsoft Press).David LeBlanc, Ph.D., is Chief Software Architect for Webroot Software, and was formerly Security Architect in the Office group at Microsoft. He is co-author of Writing Secure Code.John Viega is the CTO of Secure Software. He first defined the 19 deadly sins of software security for the Department of Homeland Security. He is co-author of many security books including Building Secure Software (Addison-Wesley).
Über den Autor und weitere Mitwirkende
David LeBlanc, Ph.D., is currently Chief Software Architect for Webroot Software. Prior to joining Webroot, he served as security architect for Microsoft's Office division, was a founding member of the Trustworthy Computing Initiative, and worked as a white-hat hacker in Microsoft's network security group. David is also co-author of Writing Secure Code and Assessing Network Security, as well as numerous articles. On good days, he'll be found riding the trails on his horse with his wife, Jennifer.
John Viega discovered the 19 deadly programming flaws that received such press and media attention, and this book is based on his discovery. He is the Founder and Chief Scientist of Secure Software(www.securesoftware.com), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly) an Adjuct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. He is the author or coauthor of nearly 80 technical publications, including numerous refered research papers and trade articles. He is coauthor of Building Secure Software, Network Security and Cryptography with OpenSSL and The Secure Programming Cookbook for C and C++.
Produktinformation
- Herausgeber : McGraw-Hill Education Ltd; ed Edition (16. Juli 2005)
- Sprache : Englisch
- Taschenbuch : 304 Seiten
- ISBN-10 : 0072260858
- ISBN-13 : 978-0072260854
- Abmessungen : 18.42 x 1.91 x 22.23 cm
- Amazon Bestseller-Rang: Nr. 2,984,306 in Bücher (Siehe Top 100 in Bücher)
- Nr. 1,101 in Internet-Kryptografie
- Nr. 3,686 in Computernetzwerke
- Nr. 3,853 in Netzwerke
- Kundenrezensionen:
Über die Autoren

Entdecke mehr Bücher des Autors, sieh dir ähnliche Autoren an, lies Autorenblogs und mehr

Entdecke mehr Bücher des Autors, sieh dir ähnliche Autoren an, lies Autorenblogs und mehr

Entdecke mehr Bücher des Autors, sieh dir ähnliche Autoren an, lies Autorenblogs und mehr
Kundenrezensionen
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.-
Spitzenrezensionen
Spitzenbewertung aus Deutschland
Derzeit tritt ein Problem beim Filtern der Rezensionen auf. Bitte versuche es später erneut.
Spitzenrezensionen aus anderen Ländern
His chapter on password systems alone is worth the price of the book. Summary: passwords are a lousy security measure that's riddled with holes but we seem to be stuck with them so we might as well make the best of it.
It is so cheap and accessible (most common languages) that it just has to be purchased for yourself and your colleagues.
As the title suggests, it covers the 19 programming sins that if left unnoticed will wreck your project and reputation.
The basic structure of each sin is an overview of the sin, affected languages, how to spot it, testing techniques to find the sin, examples of code in multiple languages, redemption steps, other resources relating to the sin and then a summary.
Buy "Writing secure code 2" first, and read it!
Buy this book second.
Refer to both books often!
Overall, a good introduction to information about common security flaws and problems. Recommended for any software developer.