Cargando…

Foundations of Security What Every Programmer Needs to Know /

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Kern, Christoph (Autor), Kesavan, Anita (Autor), Daswani, Neil (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berkeley, CA : Apress : Imprint: Apress, 2007.
Edición:1st ed. 2007.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4302-0377-3
003 DE-He213
005 20230219020149.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 |a 9781430203773  |9 978-1-4302-0377-3 
024 7 |a 10.1007/978-1-4302-0377-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Kern, Christoph.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Foundations of Security  |h [electronic resource] :  |b What Every Programmer Needs to Know /  |c by Christoph Kern, Anita Kesavan, Neil Daswani. 
250 |a 1st ed. 2007. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2007. 
300 |a XXVII, 292 p. 22 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Security Design Principles -- Security Goals -- Secure Systems Design -- Secure Design Principles -- Exercises for Part 1 -- Secure Programming Techniques -- Worms and Other Malware -- Buffer Overflows -- Client-State Manipulation -- SQL Injection -- Password Security -- Cross-Domain Security in Web Applications -- Exercises for Part 2 -- to Cryptography -- Symmetric Key Cryptography -- Asymmetric Key Cryptography -- Key Management and Exchange -- MACs and Signatures -- Exercises for Part 3. 
520 |a Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book. For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices. It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks. The lead author co-founded the Stanford Center for Professional Development Computer Security Certification. This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities. You'll receive hands-on code examples for a deep and practical understanding of security. You'll learn enough about security to get the job done. 
650 0 |a Data protection. 
650 0 |a Software engineering. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Software Engineering. 
700 1 |a Kesavan, Anita.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Daswani, Neil.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781430214311 
776 0 8 |i Printed edition:  |z 9781590597842 
776 0 8 |i Printed edition:  |z 9781484252345 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4302-0377-3  |z Texto Completo 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)