Writing Secure Code

by ;
Edition: 2nd
Format: Paperback
Pub. Date: 2002-12-04
Publisher(s): Microsoft Press
List Price: $52.49

Rent Book

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$57.59
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$57.59*

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. Writing Secure Code, 2nd Edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoftr .NET security, and Microsoft ActiveXr development, plus practical checklists for developers, testers, and program managers.

Author Biography

David LeBlanc, Ph.D., is a founding member of the Trustworthy Computing Initiative at Microsoft. He has been developing solutions for computing security issues since 1992 and has created award-winning tools for assessing network security and uncovering security vulnerabilities. David is a senior developer in the Microsoft Office Trustworthy Computing group.

Table of Contents

Part I Contemporary Security
The Need for Secure Systems
3(20)
The Proactive Security Development Process
23(28)
Security Principles to Live By
51(18)
Threat Modeling
69(58)
Part II Secure Coding Techniques
Public Enemy #1: The Buffer Overrun
127(44)
Determining Appropriate Access Control
171(36)
Running with Least Privilege
207(52)
Cryptographic Foibles
259(40)
Protecting Secret Data
299(42)
All Input Is Evil!
341(22)
Canonical Representation Issues
363(34)
Database Input Issues
397(16)
Web-Specific Input Issues
413(26)
Internationalization Issues
439(16)
Part III Even More Secure Coding Techniques
Socket Security
455(22)
Securing RPC, ActiveX Controls, and DCOM
477(40)
Protecting Against Denial of Service Attacks
517(18)
Writing Secure .NET Code
535(32)
Part IV Special Topics
Security Testing
567(48)
Performing a Security Code Review
615(12)
Secure Software Installation
627(14)
Building Privacy into Your Application
641(22)
General Good Practices
663(32)
Writing Security Documentation and Error Messages
695(42)
Part V Appendixes
A Dangerous APIs
713(10)
B Ridiculous Excuses We've Heard
723(6)
C A Designer's Security Checklist
729(2)
D A Developer's Security Checklist
731(6)
E A Tester's Security Checklist
737

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.