Cargando…

Secure programming with static analysis /

The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chess, Brian
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Colección:Addison-Wesley software security series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn154684660
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 070712s2007 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d TXJ  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d C6I  |d OCLCF  |d OCLCQ  |d YDX  |d OCLCA  |d N$T  |d AU@  |d WYU  |d OCLCO  |d UAB  |d VT2  |d OCLCQ  |d RDF  |d OCLCO  |d OCLCQ 
019 |a 1062903464  |a 1103266694  |a 1129344390  |a 1152973219  |a 1192337103  |a 1240512196 
020 |a 9780321520357  |q (electronic bk.) 
020 |a 0321520351  |q (electronic bk.) 
020 |z 9780321424778 
020 |z 0321424778 
029 1 |a AU@  |b 000067092471 
029 1 |a CHBIS  |b 006151489 
029 1 |a CHVBK  |b 171236297 
029 1 |a DEBSZ  |b 355404036 
029 1 |a HEBIS  |b 291476805 
029 1 |a AU@  |b 000073551392 
035 |a (OCoLC)154684660  |z (OCoLC)1062903464  |z (OCoLC)1103266694  |z (OCoLC)1129344390  |z (OCoLC)1152973219  |z (OCoLC)1192337103  |z (OCoLC)1240512196 
037 |a CL0500000011  |b Safari Books Online 
050 4 |a QA76.9.A25  |b C443 2007 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Chess, Brian. 
245 1 0 |a Secure programming with static analysis /  |c Brian Chess. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Addison-Wesley software security series 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed January 16, 2018) 
504 |a Includes bibliographical references and index. 
520 |a The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process "We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software."--Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language "'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know."--David Wagner, Associate Professor, University of California Berkeley "Software develope ... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Debugging in computer science. 
650 0 |a Computer software  |x Quality control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Débogage. 
650 6 |a Logiciels  |x Qualité  |x Contrôle. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Debugging in computer science.  |2 blmlsh 
650 7 |a Computer software  |x Quality control.  |2 blmlsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer software  |x Quality control.  |2 fast  |0 (OCoLC)fst00872581 
650 7 |a Debugging in computer science.  |2 fast  |0 (OCoLC)fst00888884 
776 0 8 |i Print version:  |a Chess, Brian.  |t Secure programming with static analysis.  |d Upper Saddle River, N.J. : Addison-Wesley, 2007  |w (DLC) 2007010226 
830 0 |a Addison-Wesley software security series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321424778/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 1597590 
938 |a YBP Library Services  |b YANK  |n 14858124 
994 |a 92  |b IZTAP