Secure coding in C and C++
Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++,...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River, NJ
Addison-Wesley
2013.
|
| Edition: | 2nd ed. |
| Series: | SEI series in software engineering.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100715 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025543.0 | ||
| 008 | 141013s2013 njua bi 000 0 eng d | ||
| 020 | |a 9780321822130 (pbk) | ||
| 020 | |a 0321822137 (pbk) | ||
| 039 | 9 | |a 201504111542 |b zul |c 201412151116 |d shahrim |y 201410131217 |z hasniza | |
| 040 | |a UPNM | ||
| 090 | |a QA 76.9 .A25 |b .S368 2013 | ||
| 100 | 1 | |a Seacord, Robert C. | |
| 245 | 1 | 0 | |a Secure coding in C and C++ |c Robert C. Seacord |
| 246 | 3 | |a Secure coding in C and C plus plus | |
| 250 | |a 2nd ed. | ||
| 260 | 1 | 0 | |a Upper Saddle River, NJ |b Addison-Wesley |c 2013. |
| 300 | |a xxvii, 569 p. |b ill. |c 24 cm. | ||
| 490 | 1 | |a SEI series in software engineering. | |
| 500 | |a "A CERT book"--Cover. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Chapter 1: Running with Scissors -- Chapter 2: Strings -- Chapter 3: Pointer Subterfuge -- Chapter 4: Dynamic Memory Management -- Chapter 5: Integer Security -- Chapter 6: Formatted Output -- Chapter 7: Concurrency -- Chapter 8: File I/O -- Chapter 9: Recommended Practices -- References -- Acronyms -- Index. | |
| 520 | |a Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not just today's. Drawing on the CERT's reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives. | ||
| 592 | |a 00013854 |b 25/11/2014 |c RM181.50 |h PVK | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a C (Computer program language). | |
| 650 | 0 | |a C++ (computer program language). | |
| 830 | 0 | |a SEI series in software engineering. | |
| 999 | |a vtls000052910 |c 100715 |d 100715 | ||


