Flylib.com
Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
Secure Coding: Principles Practices
Secure Coding: Principles Practices
Dedication
Copyright
Preface
Objectives of This Book
Structure of This Book
What This Book Does Not Cover
Conventions Used in This Book
About the Examples
Comments and Questions
Acknowledgments
Chapter 1. No Straight Thing
1.1 The Vulnerability Cycle
1.2 What Is an Attack?
1.3 Why Good People Write Bad Code
1.4 A Call to Arms
1.5 Summary
Chapter 2. Architecture
2.1 What Is Security Architecture?
2.2 Principles of Security Architecture
2.3 Case Study: The Java Sandbox
2.4 Summary
Chapter 3. Design
3.1 Why Does Good Design Matter?
3.2 Secure Design Steps
3.3 Special Design Issues
3.4 Bad Practices
3.5 Case Studies
3.6 Summary
Chapter 4. Implementation
4.1 Good Practices
4.2 Bad Practices
4.3 Case Studies
4.4 Summary
Chapter 5. Operations
5.1 Security Is Everybody s Problem
5.2 Good Practices
5.3 Bad Practices
5.4 Case Studies
5.5 Summary
Chapter 6. Automation and Testing
6.1 Why Test?
6.2 Good General Practices
6.3 Good Practices Through the Lifecycle
6.4 Risk Assessment Methodologies
6.5 Case Studies
6.6 Summary
Appendix A. Resources
A.1 Books
A.2 Papers and Articles
A.3 Web Sites and Online Resources
A.4 A Final Note on Resources
Colophon
index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81
BUY ON AMAZON
Qshell for iSeries
Parameters and Variables, Defined
The Exit Status and Decision-Making
Commands
Sed
Java Development Tools
A Practitioners Guide to Software Test Design
Case Studies
Boundary Value Testing
Decision Table Testing
Domain Analysis Testing
Section II - White Box Testing Techniques
101 Microsoft Visual Basic .NET Applications
Interacting with the Operating System
COM Interop/PInvoke
Visual Studio .NET
Securing Applications
Windows Server 2003 for .NET Developers
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 400: Flexible Cords and Cables
Article 426: Fixed Outdoor Electric De-Icing and Snow-Melting Equipment
Article 440: Air Conditioning and Refrigerating Equipment
Example No. D2(a) Optional Calculation for One-Family Dwelling Heating Larger than Air Conditioning [See Section 220.82]
Example D3(a) Industrial Feeders in a Common Raceway
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Value Stream Mapping and Process Flow Tools
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
SS7 and Next-Generation Networks
The Optical Core: Overlay Versus Peer-to-Peer Networking Models
DSL Technology
The Handset Revolution
The IP Multimedia Subsystem
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies