Secure Programming with C /
Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation. Writing a secure code is crucial. Because there is no direct method to h...
Autor principal: | |
---|---|
Autor Corporativo: | |
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
EC-Council,
2020.
|
Edición: | 1st edition. |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) Texto completo (Requiere registro previo con correo institucional) |
MARC
LEADER | 00000cgm a22000007a 4500 | ||
---|---|---|---|
001 | OR_on1260248048 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o c | ||
007 | cr cnu|||||||| | ||
007 | vz czazuu | ||
008 | 010721s2020 xx --- o vleng d | ||
040 | |a AU@ |b eng |c AU@ |d NZCPL |d OCLCF |d OCLCO |d OCLCQ | ||
019 | |a 1277194518 |a 1305863673 | ||
020 | |z 330220BCRV | ||
024 | 8 | |a 330220BCRV | |
029 | 0 | |a AU@ |b 000069471237 | |
035 | |a (OCoLC)1260248048 |z (OCoLC)1277194518 |z (OCoLC)1305863673 | ||
049 | |a UAMI | ||
100 | 1 | |a Poston, Howard, |e author. | |
245 | 1 | 0 | |a Secure Programming with C / |c Poston, Howard. |
250 | |a 1st edition. | ||
264 | 1 | |b EC-Council, |c 2020. | |
300 | |a 1 online resource (1 video file, approximately 4 hr., 47 min.) | ||
336 | |a two-dimensional moving image |b tdi |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a video file | ||
520 | |a Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation. Writing a secure code is crucial. Because there is no direct method to handle the exception (no in-built try and catch such as in another high-level language like C#) in the C language, it becomes the responsibility of the C developer to become extra vigilant while writing code. This course begins with a detailed explanation of the overall security of any C application. Further, it provides insights on how to write better C code, particularly a secure code that prevents pitfalls commonly encountered in the C language. This course shows you how to avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions. You will understand how to eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors. | ||
542 | |f Copyright © EC-Council |g 2020 | ||
550 | |a Made available through: Safari, an O'Reilly Media Company. | ||
588 | |a Online resource; Title from title screen (viewed October 29, 2020) | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
710 | 2 | |a Safari, an O'Reilly Media Company. | |
856 | 4 | 0 | |u https://learning.oreilly.com/videos/~/022049BCRV/?ar |z Texto completo (Requiere registro previo con correo institucional) |
856 | 4 | 0 | |u https://learning.oreilly.com/videos/~/330220BCRV/?ar |z Texto completo (Requiere registro previo con correo institucional) |
936 | |a BATCHLOAD | ||
994 | |a 92 |b IZTAP |