19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc and John Viega
By: Howard, Michael.
Contributor(s): LeBlanc, David | Viega, John.
Publisher: Emeryville, California : McGraw-Hill/Osborne, c2005Description: xxi, 281 p. : ill. ; 24 cm.ISBN: 0072260858 (pbk.); 9780072260854 (pbk.).Other title: Nineteen deadly sins of software security.Subject(s): Computer securityDDC classification: 005.8Item type | Current location | Shelf location | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
Main Collection | Taylor's Library-TU |
Floor 3, Shelf 1 , Side 1, TierNo 3, BayNo 7 |
005.8 HOW (Browse shelf) | 1 | Available | SOCIT,15009,03,CL | 5000040634 |
Browsing Taylor's Library-TU Shelves Close shelf browser
005.8 HOL Guide to network defense and countermeasures / | 005.8 HOL 2009 Guide to firewalls and network security : | 005.8 HOO Beginning cryptography with Java / | 005.8 HOW 19 deadly sins of software security : | 005.8 HOW How to cheat at securing Linux / | 005.8 HOW 2010 24 deadly sins of software security : | 005.8 HOW 2011 Security 2020 : |
Includes index.
Buffer overruns. -- Format string problems. -- Integer overflows. -- SQL injection. -- Command injection. -- Failing to handle errors. -- Cross-site scripting. -- Failing to protect network traffic. -- Use of magic URLs and hidden form fields. -- Improper use of SSL and TLS. -- Use of weak password based systems. -- Failing to store and protect data securely. -- Information leakage. -- Improper file access. -- Trusting network name resolution. -- Race conditions. -- Unautheticated key exchange. -- Crytographically strong random numbers. -- Poor usability.