Flylib.com
Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
Secure Coding: Principles Practices
Secure Coding: Principles Practices
Dedication
Copyright
Preface
Objectives of This Book
Structure of This Book
What This Book Does Not Cover
Conventions Used in This Book
About the Examples
Comments and Questions
Acknowledgments
Chapter 1. No Straight Thing
1.1 The Vulnerability Cycle
1.2 What Is an Attack?
1.3 Why Good People Write Bad Code
1.4 A Call to Arms
1.5 Summary
Chapter 2. Architecture
2.1 What Is Security Architecture?
2.2 Principles of Security Architecture
2.3 Case Study: The Java Sandbox
2.4 Summary
Chapter 3. Design
3.1 Why Does Good Design Matter?
3.2 Secure Design Steps
3.3 Special Design Issues
3.4 Bad Practices
3.5 Case Studies
3.6 Summary
Chapter 4. Implementation
4.1 Good Practices
4.2 Bad Practices
4.3 Case Studies
4.4 Summary
Chapter 5. Operations
5.1 Security Is Everybody s Problem
5.2 Good Practices
5.3 Bad Practices
5.4 Case Studies
5.5 Summary
Chapter 6. Automation and Testing
6.1 Why Test?
6.2 Good General Practices
6.3 Good Practices Through the Lifecycle
6.4 Risk Assessment Methodologies
6.5 Case Studies
6.6 Summary
Appendix A. Resources
A.1 Books
A.2 Papers and Articles
A.3 Web Sites and Online Resources
A.4 A Final Note on Resources
Colophon
index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Context Management of ERP Processes in Virtual Communities
Distributed Data Warehouse for Geo-spatial Services
A Hybrid Clustering Technique to Improve Patient Data Quality
Oracle Developer Forms Techniques
Window Management in Forms
Tracking QUERY_ONLY Mode
The Work-around for PL/SQL 2.x Limitations in Forms 4.5
Inheritance
Summary
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Internet Protocol (IP) Routing
Transmission Control Protocol (TCP) Basics
Transmission Control Protocol (TCP) Data Flow
Internet Information Services (IIS) and the Internet Protocols
Visual C# 2005 How to Program (2nd Edition)
Wrap-Up
Files and Streams
Notes on Generics and Inheritance
C.2. Breakpoints and the Continue Command
Summary
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
Extending and Embedding PHP
Data Values
Your First Extension
Reusing Old Tricks
Advanced Embedding
Streams API
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies