Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World
Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World
Date: 23 May 2011, 20:59
Product Description:
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.

DISCLAIMER:

This site does not store Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World on its server. We only index and link to Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World provided by other sites. Please contact the content providers to delete Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches