|
|
|
|
LEADER |
00000nam a2200000 i 4500 |
001 |
MGH_AEccn00316593 |
003 |
IN-ChSCO |
005 |
20210416124538.0 |
006 |
m||||||||||||||||| |
007 |
cr |n||||||||n |
008 |
210416s2010||||nyu|||||o|||||||||||eng|| |
010 |
|
|
|z 2009031994
|
020 |
|
|
|a 0071759840
|
020 |
|
|
|a 9780071626750
|
020 |
|
|
|a 0071626751 (print-ISBN)
|
035 |
|
|
|a (OCoLC)459796075
|
040 |
|
|
|a IN-ChSCO
|b eng
|e rda
|
041 |
0 |
|
|a eng
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Howard, Michael,
|d 1965-,
|e author.
|
245 |
1 |
0 |
|a 24 deadly sins of software security :
|b programming flaws and how to fix them /
|c Michael Howard, David LeBlanc, and John Viega.
|
246 |
3 |
|
|a Twenty four deadly sins of software security
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York, N.Y. :
|b McGraw-Hill Education,
|c [2010]
|
264 |
|
4 |
|c ?2010
|
300 |
|
|
|a 1 online resource (xxxvii, 393 pages) :
|b illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
1 |
|
|a McGraw-Hill's AccessEngineering
|
500 |
|
|
|a Print version c2010.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Part 1. Web application sins -- part 2. Implementation sins -- part 3. Cryptographic sins -- part 4. Networking sins.
|
520 |
0 |
|
|a A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography.
|
530 |
|
|
|a Also available in print edition.
|
533 |
|
|
|a Electronic reproduction.
|b New York, N.Y. :
|c McGraw Hill,
|d 2010.
|n Mode of access: World Wide Web.
|n System requirements: Web browser.
|n Access may be restricted to users at subscribing institutions.
|
538 |
|
|
|a Mode of access: Internet via World Wide Web.
|
546 |
|
|
|a In English.
|
588 |
|
|
|a Description based on cover image and table of contents, viewed on January 15, 2011.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a LeBlanc, David,
|d 1960-
|
700 |
1 |
|
|a Viega, John.
|
740 |
0 |
2 |
|a SQL injection.
|
740 |
0 |
2 |
|a Web server-related vulnerabilities (XSS, XSRF, and response splitting).
|
740 |
0 |
2 |
|a Web client-related vulnerabilities (XSS).
|
740 |
0 |
2 |
|a Use of magic URLS, predictable cookies, and hidden form fields.
|
740 |
0 |
2 |
|a Buffer overruns.
|
740 |
0 |
2 |
|a Format string problems.
|
740 |
0 |
2 |
|a Integer overflows.
|
740 |
0 |
2 |
|a C++ catastrophes.
|
740 |
0 |
2 |
|a Catching exceptions.
|
740 |
0 |
2 |
|a Command injection.
|
740 |
0 |
2 |
|a Failure to handle errors correctly.
|
740 |
0 |
2 |
|a Information leakage.
|
740 |
0 |
2 |
|a Race conditions.
|
740 |
0 |
2 |
|a Poor usability.
|
740 |
0 |
2 |
|a Not updating easily.
|
740 |
0 |
2 |
|a Executing code with too much privilege.
|
740 |
0 |
2 |
|a Failure to protect stored data.
|
740 |
0 |
2 |
|a Sins of mobile code.
|
740 |
0 |
2 |
|a Use of weak password-based systems.
|
740 |
0 |
2 |
|a Weak random numbers.
|
740 |
0 |
2 |
|a Using the wrong cryptography.
|
740 |
0 |
2 |
|a Failing to protect network traffic.
|
740 |
0 |
2 |
|a Improper use of PKI, especially SSL.
|
740 |
0 |
2 |
|a Trusting network name resolution.
|
776 |
0 |
|
|i Print version:
|t 24 deadly sins of software security : programming flaws and how to fix them.
|b First edition.
|d New York, N.Y. : McGraw-Hill Education, 2010
|w (OCoLC)318409161
|
830 |
|
0 |
|a McGraw-Hill's AccessEngineering.
|
856 |
4 |
0 |
|u https://accessengineeringlibrary.uam.elogim.com/content/book/9780071626750
|z Texto completo
|
997 |
|
|
|a (c)2011 Cassidy Cataloguing Services, Inc.
|