Writing Secure Code
Material type:
- 9780735617223
- 005.8 HOW
Item type | Current library | Item location | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
![]() |
NIMA Knowledge Centre | 7th Floor Silence Zone | Reference | 005.8 HOW (Browse shelf(Opens below)) | Not For Loan | T0020204 | |||
![]() |
NIMA Knowledge Centre | 9th Floor Reading Zone | General | 005.8 HOW (Browse shelf(Opens below)) | Available | T20205 |
Browsing Institute of Technology shelves, Collection: General Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 HOL Guide to Network Defense and Countermeasures | 005.8 HOL Guide to Network Defense and Countermeasures | 005.8 HOW The Security Development Lifecycle | 005.8 HOW Writing Secure Code | 005.8 HUN Information Security Handbook | 005.8 HUN Information Security Handbook | 005.8 INF Information Security: An Overview |
Part - 1: Contemporary Security The Need for Secure Systems The Proactive Security Development Process Security Principles to Live By Threat Modeling Part - 2: Secure Coding Techniques Public Enemy # 1: The Buffer Overrun Determining Appropriate Access Control Running with Least Privilege Cryptographic Foibles Protecting Secret Data All Input IS Evil! Canonical Representation Issues Database Input Issues Web Specific Input Issues Internationalization Issues Part - 3: Even More Secure Coding Techniques Socket Security Securing RPC, ActiveX Controls and DCOM Protecting Against Denial of Service Attacks Writing Secure .NET Code Part - 4: Special Topics Security Testing Performing a Security code Review Secure Software Installation Building Privacy into Your Application General God Practices Writing Security Documentation and Error Messages
There are no comments on this title.