Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development processafrom designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authorsatwo battle-scarred veterans who have solved some of the industryas toughest security problemsaprovide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.For example, any character can be represented in a URL or a Web page by using one or more of the following mechanisms: ai The anormala 7-bit or 8-bit character representation, also called USASCII ai Hexadecimal escape codes ai UTF-8anbsp;...
|Title||:||Writing Secure Code|
|Author||:||David LeBlanc, Michael Howard|
|Publisher||:||Pearson Education - 2002-12-04|