24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Nonfiction, Computers, Application Software, Computer Security
Cover of the book 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by Michael Howard, David LeBlanc, John Viega, Mcgraw-hill
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Michael Howard, David LeBlanc, John Viega ISBN: 9780071626767
Publisher: Mcgraw-hill Publication: September 3, 2009
Imprint: Language: English
Author: Michael Howard, David LeBlanc, John Viega
ISBN: 9780071626767
Publisher: Mcgraw-hill
Publication: September 3, 2009
Imprint:
Language: English

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive

Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

  • SQL injection
  • Web server- and client-related vulnerabilities
  • Use of magic URLs, predictable cookies, and hidden form fields
  • Buffer overruns
  • Format string problems
  • Integer overflows
  • C++ catastrophes
  • Insecure exception handling
  • Command injection
  • Failure to handle errors
  • Information leakage
  • Race conditions
  • Poor usability
  • Not updating easily
  • Executing code with too much privilege
  • Failure to protect stored data
  • Insecure mobile code
  • Use of weak password-based systems
  • Weak random numbers
  • Using cryptography incorrectly
  • Failing to protect network traffic
  • Improper use of PKI
  • Trusting network name resolution
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive

Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

More books from Mcgraw-hill

Cover of the book Aircraft Materials and Analysis by Michael Howard, David LeBlanc, John Viega
Cover of the book Influencing Powerful People : Engage and Command the Attention of the Decision-Makers to Get What You Need to Succeed by Michael Howard, David LeBlanc, John Viega
Cover of the book Essentials of Mechanical Ventilation, Third Edition by Michael Howard, David LeBlanc, John Viega
Cover of the book English Verb Drills by Michael Howard, David LeBlanc, John Viega
Cover of the book The Complete Guide to Investing in Rental Properties by Michael Howard, David LeBlanc, John Viega
Cover of the book Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management by Michael Howard, David LeBlanc, John Viega
Cover of the book The Big Picture: Gross Anatomy, Medical Course & Step 1 Review, Second Edition by Michael Howard, David LeBlanc, John Viega
Cover of the book Where the Fish Are : A Science-Based Guide to Stalking Freshwater Fish by Michael Howard, David LeBlanc, John Viega
Cover of the book Stigum's Money Market, 4E by Michael Howard, David LeBlanc, John Viega
Cover of the book Masonry Design and Detailing Sixth Edition by Michael Howard, David LeBlanc, John Viega
Cover of the book TAB – Simon Monk eBook Sampler by Michael Howard, David LeBlanc, John Viega
Cover of the book Build Your Own Electronics Workshop : Everything You Need to Design a Work Space, Use Test Equipment, Build and Troubleshoot Circuits: Everything You Need to Design a Work Space, Use Test Equipment, Build and Troubleshoot Circuits by Michael Howard, David LeBlanc, John Viega
Cover of the book Own the A.I. Revolution: Unlock Your Artificial Intelligence Strategy to Disrupt Your Competition by Michael Howard, David LeBlanc, John Viega
Cover of the book Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Michael Howard, David LeBlanc, John Viega
Cover of the book Simon's Emergency Orthopedics, 8th edition by Michael Howard, David LeBlanc, John Viega
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy