24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Michael Howard and Others
    • £31.99
    • £31.99

Publisher Description

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive

Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

SQL injection

Web server- and client-related vulnerabilities

Use of magic URLs, predictable cookies, and hidden form fields

Buffer overruns

Format string problems

Integer overflows

C++ catastrophes

Insecure exception handling

Command injection

Failure to handle errors

Information leakage

Race conditions

Poor usability

Not updating easily

Executing code with too much privilege

Failure to protect stored data

Insecure mobile code

Use of weak password-based systems

Weak random numbers

Using cryptography incorrectly

Failing to protect network traffic

Improper use of PKI

Trusting network name resolution

GENRE
Computing & Internet
RELEASED
2009
22 September
LANGUAGE
EN
English
LENGTH
464
Pages
PUBLISHER
McGraw Hill LLC
SIZE
9
MB

More Books Like This

Web Application Security, A Beginner's Guide Web Application Security, A Beginner's Guide
2011
Cryptography Engineering Cryptography Engineering
2011
The Shellcoder's Handbook The Shellcoder's Handbook
2011
Attacking Network Protocols Attacking Network Protocols
2017
Alice and Bob Learn Application Security Alice and Bob Learn Application Security
2020
Essential PHP Security Essential PHP Security
2005

More Books by Michael Howard, David Leblanc & John Viega

Van Gogh: His Life and Works in 500 Images Van Gogh: His Life and Works in 500 Images
2011
The First World War: A Very Short Introduction The First World War: A Very Short Introduction
2007
Clausewitz: A Very Short Introduction Clausewitz: A Very Short Introduction
2002
Never Answer To A Whistle Never Answer To A Whistle
2020
On War On War
2008
War in European History War in European History
2001