The CERT Oracle Secure Coding Standard for Java

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The CERT Oracle Secure Coding Standard for Java by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord ISBN: 9780132882859
Publisher: Pearson Education Publication: September 6, 2011
Imprint: Addison-Wesley Professional Language: English
Author: Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
ISBN: 9780132882859
Publisher: Pearson Education
Publication: September 6, 2011
Imprint: Addison-Wesley Professional
Language: English
 


“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A set of standard practices has evolved over the years. The Secure® Coding® Standard for Java™ is a compendium of these practices. These are not theoretical research papers or product marketing blurbs. This is all serious, mission-critical, battle-tested, enterprise-scale stuff.”

James A. Gosling, Father of the Java Programming Language

 

An essential element of secure coding in the Java programming language is a well-documented and enforceable coding standard. Coding standards encourage programmers to follow a uniform set of rules determined by the requirements of the project and organization, rather than by the programmer’s familiarity or preference. Once established, these standards can be used as a metric to evaluate source code (using manual or automated processes).

 

The CERT® Oracle® Secure Coding Standard for Java™ provides rules designed to eliminate insecure coding practices that can lead to exploitable vulnerabilities. Application of the standard’s guidelines will lead to higher-quality systems–robust systems that are more resistant to attack. Such guidelines are required for the wide range of products coded in Java–for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics.

 

After a high-level introduction to Java application security, seventeen consistently organized chapters detail specific rules for key areas of Java development. For each area, the authors present noncompliant examples and corresponding compliant solutions, show how to assess risk, and offer references for further information. Each rule is prioritized based on the severity of consequences, likelihood of introducing exploitable vulnerabilities, and cost of remediation.

 

The standard provides secure coding rules for the Java SE 6 Platform including the Java programming language and libraries, and also addresses new features of the Java SE 7 Platform. It describes language behaviors left to the discretion of JVM and compiler implementers, guides developers in the proper use of Java’s APIs and security architecture, and considers  security concerns pertaining to standard extension APIs (from the javax package hierarchy).The standard covers security issues applicable to these libraries: lang, util, Collections, Concurrency Utilities, Logging, Management, Reflection, Regular Expressions, Zip, I/O, JMX, JNI, Math, Serialization, and JAXP.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
 


“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A set of standard practices has evolved over the years. The Secure® Coding® Standard for Java™ is a compendium of these practices. These are not theoretical research papers or product marketing blurbs. This is all serious, mission-critical, battle-tested, enterprise-scale stuff.”

James A. Gosling, Father of the Java Programming Language

 

An essential element of secure coding in the Java programming language is a well-documented and enforceable coding standard. Coding standards encourage programmers to follow a uniform set of rules determined by the requirements of the project and organization, rather than by the programmer’s familiarity or preference. Once established, these standards can be used as a metric to evaluate source code (using manual or automated processes).

 

The CERT® Oracle® Secure Coding Standard for Java™ provides rules designed to eliminate insecure coding practices that can lead to exploitable vulnerabilities. Application of the standard’s guidelines will lead to higher-quality systems–robust systems that are more resistant to attack. Such guidelines are required for the wide range of products coded in Java–for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics.

 

After a high-level introduction to Java application security, seventeen consistently organized chapters detail specific rules for key areas of Java development. For each area, the authors present noncompliant examples and corresponding compliant solutions, show how to assess risk, and offer references for further information. Each rule is prioritized based on the severity of consequences, likelihood of introducing exploitable vulnerabilities, and cost of remediation.

 

The standard provides secure coding rules for the Java SE 6 Platform including the Java programming language and libraries, and also addresses new features of the Java SE 7 Platform. It describes language behaviors left to the discretion of JVM and compiler implementers, guides developers in the proper use of Java’s APIs and security architecture, and considers  security concerns pertaining to standard extension APIs (from the javax package hierarchy).The standard covers security issues applicable to these libraries: lang, util, Collections, Concurrency Utilities, Logging, Management, Reflection, Regular Expressions, Zip, I/O, JMX, JNI, Math, Serialization, and JAXP.

More books from Pearson Education

Cover of the book Sams Teach Yourself Mod Development for Minecraft in 24 Hours by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book Photoshop Elements 7 for Windows by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book Arduino for Beginners by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book From Acorns by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book Effective C# (Covers C# 4.0) by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book Sams Teach Yourself Facebook in 10 Minutes by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book System Center Operations Manager (OpsMgr) 2007 R2 Unleashed by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book The Secrets of Economic Indicators by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book The Essential Guide to Telecommunications by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book C for Programmers with an Introduction to C11 by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book The Truth About Making Better Decisions by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book How to Influence and Persuade 2nd edn by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book Simple Secrets to Motivating People Over the Long Term by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book CCNP Wireless (642-732 CUWSS) Quick Reference by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
Cover of the book OpenACC for Programmers by Fred Long, Dhruv Mohindra, Dean F. Sutherland, David Svoboda, Robert C. Seacord
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy