Product Description & Reviews
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Features & Highlights
|Item Weight:||3.02 pounds|
|Item Size:||1.67 x 9.17 x 9.17 inches|
|Package Weight:||3.45 pounds|
|Package Size:||7.4 x 2 x 2 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
By Siriwardena Prabath
mpn: 43190-236062, ean: 9781430268185, isbn: 1430268182,
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in...
mpn: Illustrated, ean: 9781597499637, isbn: 1597499633,
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award ''SQL injection is probably the number one problem for ...
By Addison-Wesley Professional
mpn: 36080949, ean: 9780321822130, isbn: 9780321822130,
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable...