Flylib.com
Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
Secure Coding: Principles Practices
Secure Coding: Principles Practices
Dedication
Copyright
Preface
Objectives of This Book
Structure of This Book
What This Book Does Not Cover
Conventions Used in This Book
About the Examples
Comments and Questions
Acknowledgments
Chapter 1. No Straight Thing
1.1 The Vulnerability Cycle
1.2 What Is an Attack?
1.3 Why Good People Write Bad Code
1.4 A Call to Arms
1.5 Summary
Chapter 2. Architecture
2.1 What Is Security Architecture?
2.2 Principles of Security Architecture
2.3 Case Study: The Java Sandbox
2.4 Summary
Chapter 3. Design
3.1 Why Does Good Design Matter?
3.2 Secure Design Steps
3.3 Special Design Issues
3.4 Bad Practices
3.5 Case Studies
3.6 Summary
Chapter 4. Implementation
4.1 Good Practices
4.2 Bad Practices
4.3 Case Studies
4.4 Summary
Chapter 5. Operations
5.1 Security Is Everybody s Problem
5.2 Good Practices
5.3 Bad Practices
5.4 Case Studies
5.5 Summary
Chapter 6. Automation and Testing
6.1 Why Test?
6.2 Good General Practices
6.3 Good Practices Through the Lifecycle
6.4 Risk Assessment Methodologies
6.5 Case Studies
6.6 Summary
Appendix A. Resources
A.1 Books
A.2 Papers and Articles
A.3 Web Sites and Online Resources
A.4 A Final Note on Resources
Colophon
index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 4. Search the Internet
Objective 7. Use the Spelling and Grammar Checker
Business Running Case
Objective 3. Enter and Edit Data in a Worksheet
Objective 12. Use Calculated Fields in a Query
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter XII Web Design and E-Commerce
Chapter XIV Product Catalog and Shopping Cart Effective Design
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Properties, Methods, and Events
Events in the Outlook Object Model
Working with the Explorers and Inspectors Collections
VSTO Extensions to the Word and Excel Object Models
Introduction to Words XML Features
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Satellite
Multimedia Networking Requirements
Broadband Access Alternatives
Cable TV Networks
Spectrum Utilization
MPLS Configuration on Cisco IOS Software
MPLS Overview
Overview of MPLS Forwarding
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Command Reference
Command Reference
VBScript in a Nutshell, 2nd Edition
Functions and Procedures
Program Flow
Section A.11. Mathematical and Numeric
Section B.8. String Constants
Section C.3. Comparison Operators
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies