Other Resources

  • W3C HTML Hidden Field specification: www.w3.org/TR/REC-html32#fields

  • Practical Cryptography by Niels Ferguson and Bruce Schneier (Wiley, 2003), 6.3 Weaknesses of Hash Functions

  • PEAR HMAC: http://pear.php.net/package/Crypt_HMAC

  • Hold Your Sessions: An Attack on Java Session-Id Generation by Zvi Gutterman and Dahlia Malkhi: http://research.microsoft.com/~dalia/pubs/GM05.pdf



19 Deadly Sins of Software Security. Programming Flaws and How to Fix Them
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net