Secure coding in C and C++

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++,...

Full description

Saved in:
Bibliographic Details
Main Author: Seacord, Robert C.
Format: Book
Language:English
Published: Upper Saddle River, NJ Addison-Wesley 2013.
Edition:2nd ed.
Series:SEI series in software engineering.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100715
003 MY-KLNDU
005 20241220025543.0
008 141013s2013 njua bi 000 0 eng d
020 |a 9780321822130 (pbk) 
020 |a 0321822137 (pbk) 
039 9 |a 201504111542  |b zul  |c 201412151116  |d shahrim  |y 201410131217  |z hasniza 
040 |a UPNM 
090 |a QA 76.9 .A25  |b .S368 2013 
100 1 |a Seacord, Robert C. 
245 1 0 |a Secure coding in C and C++  |c Robert C. Seacord 
246 3 |a Secure coding in C and C plus plus 
250 |a 2nd ed. 
260 1 0 |a Upper Saddle River, NJ  |b Addison-Wesley  |c 2013. 
300 |a xxvii, 569 p.  |b ill.  |c 24 cm. 
490 1 |a SEI series in software engineering. 
500 |a "A CERT book"--Cover. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1: Running with Scissors -- Chapter 2: Strings -- Chapter 3: Pointer Subterfuge -- Chapter 4: Dynamic Memory Management -- Chapter 5: Integer Security -- Chapter 6: Formatted Output -- Chapter 7: Concurrency -- Chapter 8: File I/O -- Chapter 9: Recommended Practices -- References -- Acronyms -- Index. 
520 |a Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not just today's. Drawing on the CERT's reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives. 
592 |a 00013854  |b 25/11/2014  |c RM181.50  |h PVK 
650 0 |a Computer security. 
650 0 |a C (Computer program language). 
650 0 |a C++ (computer program language). 
830 0 |a SEI series in software engineering. 
999 |a vtls000052910  |c 100715  |d 100715