Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載


Secure Programming with Static Analysis (Addison-Wesley Software Security Series)

簡體網頁||繁體網頁

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) pdf epub mobi 著者簡介


Secure Programming with Static Analysis (Addison-Wesley Software Security Series) pdf epub mobi 圖書描述

<P style="MARGIN: 0px">The First Expert Guide to Static Analysis for Software Security!</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there&rsquo;s a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Coverage includes:</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">  Why conventional bug-catching often misses security problems</P> <P style="MARGIN: 0px">  How static analysis can help programmers get security right</P> <P style="MARGIN: 0px">  The critical attributes and algorithms that make or break a static analysis tool</P> <P style="MARGIN: 0px">  36 techniques for making static analysis more effective on your code</P> <P style="MARGIN: 0px">  More than 70 types of serious security vulnerabilities, with specific solutions</P> <P style="MARGIN: 0px">  Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more</P> <P style="MARGIN: 0px">  Techniques for handling untrusted input</P> <P style="MARGIN: 0px">  Eliminating buffer overflows: tactical and strategic approaches</P> <P style="MARGIN: 0px">  Avoiding errors specific to Web applications, Web services, and Ajax</P> <P style="MARGIN: 0px">  Security-aware logging, debugging, and error/exception handling</P> <P style="MARGIN: 0px">  Creating, maintaining, and sharing secrets and confidential information</P> <P style="MARGIN: 0px">  Detailed tutorials that walk you through the static analysis process</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">“We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software.”</P> <P style="MARGIN: 0px">&ndash;Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">“'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know.”</P> <P style="MARGIN: 0px">&ndash;David Wagner, Associate Professor, University of California Berkeley</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">“Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited.”</P> <P style="MARGIN: 0px">&ndash;Howard A. Schmidt, Former White House Cyber Security Advisor</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">JACOB WEST manages Fortify Software&rsquo;s Security Research Group, which is responsible for building security knowledge into Fortify&rsquo;s products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">CD contains a working demonstration version of Fortify Software&rsquo;s Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Part I: Software Security and Static Analysis 1</P> <P style="MARGIN: 0px">1 The Software Security Problem 3</P> <P style="MARGIN: 0px">2 Introduction to Static Analysis 21</P> <P style="MARGIN: 0px">3 Static Analysis as Part of the Code Review Process 47</P> <P style="MARGIN: 0px">4 Static Analysis Internals 71</P> <P style="MARGIN: 0px">Part II: Pervasive Problems 115</P> <P style="MARGIN: 0px">5 Handling Input 117</P> <P style="MARGIN: 0px">6 Buffer Overflow 175</P> <P style="MARGIN: 0px">7 Bride of Buffer Overflow 235</P> <P style="MARGIN: 0px">8 Errors and Exceptions 265</P> <P style="MARGIN: 0px">Part III: Features and Flavors 295</P> <P style="MARGIN: 0px">9 Web Applications 297</P> <P style="MARGIN: 0px">10 XML and Web Services 349</P> <P style="MARGIN: 0px">11 Privacy and Secrets 379</P> <P style="MARGIN: 0px">12 Privileged Programs 421</P> <P style="MARGIN: 0px">Part IV: Static Analysis in Practice 457</P> <P style="MARGIN: 0px">13 Source Code Analysis Exercises for Java 459</P> <P style="MARGIN: 0px">14 Source Code Analysis Exercises for C 503</P> <P style="MARGIN: 0px">Epilogue 541</P> <P style="MARGIN: 0px">References 545</P> <P style="MARGIN: 0px">Index 559</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px"> </P>

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) pdf epub mobi 圖書目錄




點擊這裡下載
    


想要找書就要到 本本書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

發表於2024-11-23

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載



喜欢 Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 電子書 的读者还喜欢


Secure Programming with Static Analysis (Addison-Wesley Software Security Series) pdf epub mobi 讀後感

評分

書是相當的不錯,能讓我們避免大部分在程序設計中的錯誤,但是 我一直有個疑問,這樣復雜的check 還是相當影響開發速度的。看來老闆是不喜歡這本書瞭 ps:豆瓣的編輯 做的不好,一看這個介紹就是從某個網站上拔下來的,都沒經過編輯

評分

書是相當的不錯,能讓我們避免大部分在程序設計中的錯誤,但是 我一直有個疑問,這樣復雜的check 還是相當影響開發速度的。看來老闆是不喜歡這本書瞭 ps:豆瓣的編輯 做的不好,一看這個介紹就是從某個網站上拔下來的,都沒經過編輯

評分

書是相當的不錯,能讓我們避免大部分在程序設計中的錯誤,但是 我一直有個疑問,這樣復雜的check 還是相當影響開發速度的。看來老闆是不喜歡這本書瞭 ps:豆瓣的編輯 做的不好,一看這個介紹就是從某個網站上拔下來的,都沒經過編輯

評分

書是相當的不錯,能讓我們避免大部分在程序設計中的錯誤,但是 我一直有個疑問,這樣復雜的check 還是相當影響開發速度的。看來老闆是不喜歡這本書瞭 ps:豆瓣的編輯 做的不好,一看這個介紹就是從某個網站上拔下來的,都沒經過編輯

評分

書是相當的不錯,能讓我們避免大部分在程序設計中的錯誤,但是 我一直有個疑問,這樣復雜的check 還是相當影響開發速度的。看來老闆是不喜歡這本書瞭 ps:豆瓣的編輯 做的不好,一看這個介紹就是從某個網站上拔下來的,都沒經過編輯

類似圖書 點擊查看全場最低價
出版者:Addison-Wesley Professional
作者:Brian Chess
出品人:
頁數:624
譯者:
出版時間:2007-07-09
價格:USD 49.99
裝幀:Paperback
isbn號碼:9780321424778
叢書系列:

圖書標籤: Computer.Security  安全  Computer.Programming  靜態分析  軟件安全  計算機科學  編程  程序分析   


Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載
想要找書就要到 本本書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) pdf epub mobi 用戶評價

評分

評分

評分

評分

評分

Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2024 pdf epub mobi 電子書 下載


分享鏈接





相關圖書




本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 onlinetoolsland.com All Rights Reserved. 本本書屋 版權所有