Facebook Twitter Pinterest <Einbetten>
EUR 42,95
  • Alle Preisangaben inkl. MwSt.
Nur noch 6 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Secure+Coding+in+C+and+C+... ist in Ihrem Einkaufwagen hinzugefügt worden
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 3 Bilder anzeigen

Secure Coding in C and C++ (SEI Series in Software Engineering (Paperback)) (Englisch) Taschenbuch – 29. März 2013

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 42,95
EUR 34,29 EUR 39,83
48 neu ab EUR 34,29 7 gebraucht ab EUR 39,83
click to open popover

Wird oft zusammen gekauft

  • Secure Coding in C and C++ (SEI Series in Software Engineering (Paperback))
  • +
  • The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems (SEI Series in Software Engineering (Paperback))
Gesamtpreis: EUR 85,90
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.



Über den Autor und weitere Mitwirkende

Robert C. Seacord is currently the Secure Coding Technical Manager in the CERT Program of Carnegie Mellon s Software Engineering Institute (SEI). He is the author or coauthor of five books, including "The CERT" (r) "C Secure Coding Standard "(Addison-Wesley, 2009), and is the author and instructor of a video training series, "Professional C Programming LiveLessons, Part I: Writing Robust, Secure, Reliable Code "(Addison-Wesley, 2013). "


Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.7 von 5 Sternen 13 Rezensionen
30 von 30 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Should be called 'Secure Coding in C' 10. Oktober 2013
Von mdub - Veröffentlicht auf Amazon.com
Format: Taschenbuch
As a C++ application developer, this book is simply not what I excpected. Most of the security issues surround the use of C API and C-style programming. The C++ parts are skimpy and often presented as safer alternatives.

Still, there is a lot of interesting stuff here. I like that each chapter goes into a lot of detail explaining how things work (stack, heap, file systems, etc) before the security holes are presented. On the other hand the chapter on threads include little more than an explenantion of how threads work and synchronize.

Overall great for C programmers, but not really for those that already embrace the C++ programming style (std::string, RAII/smart ptrs , iostreams, boost thread/filesystem, etc)
8 von 8 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great book for both beginner and advanced coders 13. Mai 2013
Von Michael - Veröffentlicht auf Amazon.com
Format: Taschenbuch
This is a great book that should be required reading for anyone interested in learning how to exploit vulnerable code and secure their C and C++ programs. This book covers a variety of topics going in depth on how to exploit vulnerable programs, describing important case studies, and securing code. Seacord provides excellent explanations for how and why C and C++ programs are so easily vulnerable to attack as well as the solutions to these vulnerabilities.

A new C/C++ programmer might find the field of hacking, bug fixes, and computer security to be quite intimidating. Writing code that is secure against security exploits can be quite difficult because of the seemingly unlimited number of ways an attacker can exploit code. Seacord's new book is exceptional because of the thoroughness with which the book covers all topics including security holes, history, and consequences of being attacked.

While reading through this book, one point that surprised me was that even perfectly reasonable code can be easily exploitable code when seen through the eyes of a malicious attacker. Many of these problems occur because of the way in which C is designed, trusting the coder to make the correct decisions in favor of fast performance. Unfortunately, new programers cannot know what the correct decision is unless they have studied the problem of attacking and securing code. This book is great material for anyone who wants to learn how to see code through the eyes of an attacker and also to defend against malicious code. This book should definitely be required reading for anyone interested in securing their C code as well as learning how attackers exploit code.
7 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An excellent text on coding to create "hacker-proof" software... 8. Oktober 2013
Von Michael Reeves - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
This is an excellent text offering an overview of all the various ways that programmers leave holes in their software that malicious hackers (Black Hat Hackers) can use to attack software. The simple examples demonstrate how a malicious hacker would write code to attack your system, and infiltrate your systems to gather information for criminal activity or use.

The author includes suggestions and examples of how to avoid programming these types of vulnerabilities into your software projects.

In today's age, more often than not, fixing "bugs" in programs is based on the business model of a Return-On-Investment (ROI). As a result, coding vulnerabilities are often left in place to avoid the expense and time required to track issues, re-code, and test the software.

Unfortunately, after reading this text, I realize that the problems didn't start with the business model, but with how programmers are trained. Beginning students of programming are not made aware of the concerns presented in this text, and how to correct for them until much later, IF at all, in their training.

As a result, students will form bad-habits in their coding paradigm that this text addresses.

This text or similar needs to be a mandate for beginning programmers. I, certainly, wish that my professors and mentors had brought the topics contained in this book to my attention as a beginning student in the field.

This text has a permanent place in my library.


9 von 10 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Required reading for anyone who codes in C or C++ 7. Mai 2013
Von Ben Rothke - Veröffentlicht auf Amazon.com
Format: Taschenbuch
Behind nearly every security vulnerability is poorly written or insecure code. Fix the code and a majority of the security vulnerabilities go away.

In the just released 2nd edition of Secure Coding in C and C++, author Robert Seacord of CERT has created an invaluable resource for developers.

Research from OWASP and CERT shows that a lion's share of core vulnerabilities can be found in a small number of root causes. In the book, Seacord tackles those root causes.

Like a good programmer, the book is methodical and details all of the core areas which can lead to security vulnerabilities. The book shows how they are exploited and how they can be fixed.

The average C programmer knows about buffer overflows, authentication, format strings and more. But if they don't know how to write secure code, they will invariably write insecure code.

Aside from the inherent security and privacy benefits, there is significant cost savings to writing secure code.

For anyone who codes in C or C++, Secure Coding in C and C++ should be required reading.
2 von 2 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good Orientation on Secure Coding 30. August 2013
Von Anonymous Customer - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
This is a good start into thinking more securely as a programmer. I think it's important knowledge if you regularly program in C/C++. Everyone who's used the language knows that "pointers can get you into trouble," but knowing exactly what can be used against your lack of oversight is a much more concrete motivation to pay attention. If you're one of those punk kids who always wants to know why you follow proper practices, read it. These languages give you freedom under the assumption you know what you're doing, and this book definitely helps.

That said, I think while its initial impact is significant, it's value drops significantly after the first read, as its lessons are more philosophical than a reference. Unless you're loaning it out to punk kids you work with who need to stop recklessly managing memory. If you or someone you know thinks C is anything but a cold harsh mistress with no more attachment to you than your goldfish, this book is probably for you.

An intermediate knowledge of a C language is necessary, although I'd say memory of irresponsible design decisions helps reinforce the material better.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.