Facebook Twitter Pinterest <Einbetten>
  • Alle Preisangaben inkl. USt
Auf Lager.
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Java Coding Guidelines: 7... ist in Ihrem Einkaufwagen hinzugefügt worden

Lieferort:
Um Adressen zu sehen, bitte
Oder
Bitte tragen Sie eine deutsche PLZ ein.
Oder
+ EUR 3,00 Versandkosten
Gebraucht: Wie neu | Details
Zustand: Gebraucht: Wie neu
Kommentar: Like New Paperback/Softcover Book, International Economy Edition. Author , Content & Edition is same as Listed edition. Satisfaction Guaranteed .ISBN AND COVER MAY BE CHANGED. The access code or CD may be not available with this book. Guaranteed Super Fast Delivery
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs (SEI Series in Software Engineering) (SEI Series in Software Engineering (Paperback)) (Englisch) Taschenbuch – 30. August 2013

3,9 von 5 Sternen
5 Sterne
6
4 Sterne
4
3 Sterne
1
2 Sterne
0
1 Stern
1
3,9 von 5 Sternen 12 Kundenrezensionen auf Amazon.com

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Taschenbuch
"Bitte wiederholen"
EUR 37,40
EUR 28,94 EUR 24,83
50 neu ab EUR 28,94 8 gebraucht ab EUR 24,83
click to open popover

Wird oft zusammen gekauft

  • Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs (SEI Series in Software Engineering) (SEI Series in Software Engineering (Paperback))
  • +
  • The CERT Oracle Secure Coding Standard for Java (SEI Series in Software Engineering) (SEI Series in Software Engineering (Paperback))
Gesamtpreis: EUR 88,71
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Pressestimmen

"This set of "Java(TM) Coding Guidelines", a follow-on to the earlier ""The CERT(R) Oracle Secure Coding Standard for Java"(TM), "is invaluable. This book could almost be retitled "Reliable Java(TM) Coding""Guidelines." One of the things that has struck me over the years is the interplay between reliability and security. There are all sorts of explicit security tools--cryptography, authentication, and others--but most break-ins are exploitations of bugs: coding that was badly done or that was insufficiently defensive. Building a reliable system is, in many ways, equivalent to building a secure system. The work you do in reliability pays off in security, and vice versa.
"This book highlights the fact that security is not a feature; it is an attitude toward taking due care at every point. It should be a continuous part of every software engineer's design thought process. It is organized around a list of guidelines. The meat of the book is the subtlety behind them. For example, "Store passwords using a hash function" appears to be a very basic and obvious point, and yet there are regular news articles about major data breaches just because some software engineer wasn't thinking. Getting it right is tricky: there are a lot of details for the devil to hide in. This book is full of excellent guidance for dealing with those details."
--James A. Gosling

"This set of "Java(TM) Coding Guidelines," a follow-on to the earlier ""The CERT(R) Oracle Secure Coding Standard for Java"(TM), "is invaluable. This book could almost be retitled "Reliable Java(TM) Coding""Guidelines." One of the things that has struck me over the years is the interplay between reliability and security. There are all sorts of explicit security tools--cryptography, authentication, and others--but most break-ins are exploitations of bugs: coding that was badly done or that was insufficiently defensive. Building a reliable system is, in many ways, equivalent to building a secure system. The work you do in reliability pays off in security, and vice versa.
"This book highlights the fact that security is not a feature; it is an attitude toward taking due care at every point. It should be a continuous part of every software engineer's design thought process. It is organized around a list of guidelines. The meat of the book is the subtlety behind them. For example, "Store passwords using a hash function" appears to be a very basic and obvious point, and yet there are regular news articles about major data breaches just because some software engineer wasn't thinking. Getting it right is tricky: there are a lot of details for the devil to hide in. This book is full of excellent guidance for dealing with those details."
--James A. Gosling

"This set of " Java Coding Guidelines ", a follow-on to the earlier " "The CERT(r) Oracle Secure Coding Standard for Java", "is invaluable. This book could almost be retitled "Reliable Java Coding" "Guidelines." One of the things that has struck me over the years is the interplay between reliability and security. There are all sorts of explicit security tools cryptography, authentication, and others but most break-ins are exploitations of bugs: coding that was badly done or that was insufficiently defensive. Building a reliable system is, in many ways, equivalent to building a secure system. The work you do in reliability pays off in security, and vice versa.
"This book highlights the fact that security is not a feature; it is an attitude toward taking due care at every point. It should be a continuous part of every software engineer s design thought process. It is organized around a list of guidelines. The meat of the book is the subtlety behind them. For example, Store passwords using a hash function appears to be a very basic and obvious point, and yet there are regular news articles about major data breaches just because some software engineer wasn t thinking. Getting it right is tricky: there are a lot of details for the devil to hide in. This book is full of excellent guidance for dealing with those details."
James A. Gosling"

Über den Autor und weitere Mitwirkende

Fred Long is a senior lecturer in the Department of Computer Science, Aberystwyth University, in the United Kingdom. He is chairman of the British Computer Society s Mid-Wales Branch. Fred has been a visiting scientist at the Software Engineering Institute (SEI) since 1992. Recently, his research has involved the investigation of vulnerabilities in Java. Fred is also a coauthor of "The CERT(r) Oracle(r) Secure Coding Standard for Java " (Addison-Wesley, 2012). Dhruv Mohindra is a technical lead in the security practices group that is part of the CTO s office at Persistent Systems Limited, India, where he provides information security consulting solutions across various technology verticals such as cloud, collaboration, banking and finance, telecommunications, enterprise, mobility, life sciences, and health care. Dhruv has worked for CERT at the Software Engineering Institute and continues to collaborate to improve the state of security awareness in the programming community. Dhruv is also a coauthor of "The CERT(r) Oracle(r) Secure Coding Standard for Java "(Addison-Wesley, 2012). Robert C. Seacord is the Secure Coding Initiative technical manager in the CERT Program of Carnegie Mellon s Software Engineering Institute (SEI) in Pittsburgh, Pennsylvania. Robert is also a professor in the School of Computer and the Information Networking Institute at Carnegie Mellon University. He is the author of "The CERT C Secure Coding Standard "(Addison-Wesley, 2008), and is coauthor of "Building Systems from Commercial Components "(Addison-Wesley, 2002), "Modernizing Legacy Systems "(Addison-Wesley, 2003), "The CERT(r) Oracle(r) Secure Coding Standard for Java "(Addison-Wesley, 2012), and "Secure Coding in C and C++ "(Addison-Wesley, 2013). Dean F. Sutherland is a senior software security engineer at CERT. Dean received his Ph.D. in software engineering from Carnegie Mellon in 2008. Before his return to academia, he spent 14 years working as a professional software engineer at Tartan, Inc. He spent the last six of those years as a senior member of the technical staff and a technical lead for compiler backend technology. Dean is also a coauthor of "The CERT(r) Oracle(r) Secure Coding Standard for Java " (Addison-Wesley, 2012). David Svoboda is a software security engineer at CERT/SEI. He also maintains the CERT Secure Coding standard websites for Java, as well as C, C++, and Perl. David has been the primary developer on a diverse set of software development projects at Carnegie Mellon since 1991, ranging from hierarchical chip modeling and social organization simulation to automated machine translation (AMT). David is also a coauthor of "The CERT(r) Oracle(r) Secure Coding Standard for Java " (Addison-Wesley, 2012). "

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta) (Kann Kundenrezensionen aus dem "Early Reviewer Rewards"-Programm beinhalten)

Amazon.com: 3.9 von 5 Sternen 12 Rezensionen
5.0 von 5 Sternen Five Stars 22. Februar 2015
Von Walter R. Houser - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Java Coding Guidelines is a unique and authoritative contribution to the field of application security.
0 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Four Stars 22. Dezember 2014
Von jaco0646 - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
A useful reference.
0 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Five Stars 16. Dezember 2014
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
good guidelines
0 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Very Useful for Java Developers 13. März 2014
Von TechnoMonk - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I used quite a few of these recommendations in my Java apps, and now they work great and are more secure. Anyone who is a Java developer or a software analyst should read this book.
0 von 2 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Recommended reading 19. Dezember 2013
Von Angel M. Cereijo - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
The book is a recommended lecture to every java programmer.
It's a easy and quickly reading for a low price.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.