Writing Secure Code Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World

ISBN-10: 0735617228

ISBN-13: 9780735617223

Edition: 2nd 2003 (Revised)

Authors: David LeBlanc, Michael Howard

List price: $49.99 Buy it from $3.00
eBook available
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

Used Starting from $23.54
eBooks Starting from $39.99
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2003
Publisher: Pearson Education
Publication date: 12/4/2002
Binding: Paperback
Pages: 800
Size: 7.00" wide x 9.00" long x 2.00" tall
Weight: 0.990
Language: English

David LeBlanc, Ph.D., is a founding member of the Trustworthy Computing Initiative at Microsoft(R). He has been developing solutions for computing security issues since 1992 and has created award-winning tools for assessing network security and uncovering security vulnerabilities. David is a senior developer in the Microsoft Office Trustworthy Computing group.

Contemporary Security
The Need for Secure Systems
The Proactive Security Development Process
Security Principles to Live By
Threat Modeling
Secure Coding Techniques
Public Enemy #1: The Buffer Overrun
Determining Appropriate Access Control
Running with Least Privilege
Cryptographic Foibles
Protecting Secret Data
All Input Is Evil!
Canonical Representation Issues
Database Input Issues
Web-Specific Input Issues
Internationalization Issues
Even More Secure Coding Techniques
Socket Security
Securing RPC, ActiveX Controls, and DCOM
Protecting Against Denial of Service Attacks
Writing Secure .NET Code
Special Topics
Security Testing
Performing a Security Code Review
Secure Software Installation
Building Privacy into Your Application
General Good Practices
Writing Security Documentation and Error Messages
Appendixes
Dangerous APIs
Ridiculous Excuses We've Heard
A Designer's Security Checklist
A Developer's Security Checklist
A Tester's Security Checklist
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×