24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Download or Read eBook 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them PDF written by Michael Howard and published by McGraw Hill Professional. This book was released on 2009-09-22 with total page 433 pages. Available in PDF, EPUB and Kindle.
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Author :
Publisher : McGraw Hill Professional
Total Pages : 433
Release :
ISBN-10 : 9780071626767
ISBN-13 : 007162676X
Rating : 4/5 (67 Downloads)

Book Synopsis 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by : Michael Howard

Book excerpt: "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution


24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them Related Books

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Language: en
Pages: 433
Authors: Michael Howard
Categories: Computers
Type: BOOK - Published: 2009-09-22 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to unders
19 Deadly Sins of Software Security
Language: en
Pages: 308
Authors: Michael Howard
Categories: Computers
Type: BOOK - Published: 2005-07-26 - Publisher: McGraw-Hill Osborne Media

DOWNLOAD EBOOK

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software securit
Secure Programming Cookbook for C and C++
Language: en
Pages: 792
Authors: John Viega
Categories: Computers
Type: BOOK - Published: 2003-07-14 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root
Secure Software Development
Language: en
Pages: 317
Authors: Jason Grembi
Categories: Computers
Type: BOOK - Published: 2008 - Publisher: Delmar Pub

DOWNLOAD EBOOK

Leads readers through the tasks and activities that successful computer programmers navigate on a daily basis.
Real World Linux Security
Language: en
Pages: 852
Authors: Bob Toxen
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

DOWNLOAD EBOOK

With all-new coverage of home, mobile, and wireless issues, migrating from IP chains to IP tables, and protecting your network from users as well as hackers, th