000 01635nam a2200205Ia 4500
008 140223b2003 xxu||||| |||| 00| 0 eng d
020 _a9780735617223
_c0.00
082 _a005.8
_bHOW
100 _aHoward, Michael
245 _aWriting Secure Code
250 _a2nd ed
260 _aWashington
_bMicrosoft Press
_c2003
300 _a768p
500 _aPart - 1: Contemporary Security The Need for Secure Systems The Proactive Security Development Process Security Principles to Live By Threat Modeling Part - 2: Secure Coding Techniques Public Enemy # 1: The Buffer Overrun Determining Appropriate Access Control Running with Least Privilege Cryptographic Foibles Protecting Secret Data All Input IS Evil! Canonical Representation Issues Database Input Issues Web Specific Input Issues Internationalization Issues Part - 3: Even More Secure Coding Techniques Socket Security Securing RPC, ActiveX Controls and DCOM Protecting Against Denial of Service Attacks Writing Secure .NET Code Part - 4: Special Topics Security Testing Performing a Security code Review Secure Software Installation Building Privacy into Your Application General God Practices Writing Security Documentation and Error Messages
600 _aComputer Engineering
700 _aLeBlanc, David
890 _aUSA
995 _AHOW
_CCET-NIT
_D350.00
_E0
_F049
_H0
_I0.00
_Jby Computer Department
_UC
_W20040415
_XGratis1
_ZReference
995 _AHOW
_CCET-NIT
_D350.00
_E0
_F049
_H0
_I0.00
_Jby Computer Department
_UC
_W20040415
_XGratis1
_ZGeneral
999 _c44014
_d44014