Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering. Platform: |
Size: 1406512 |
Author:周爽 |
Hits:
Description: If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building applications, you will find much to learn in this book.
-If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web - based or Win32 - based, you need this book. Finally, if you are currently learning or building Micro soft.NET Framework-based applications. you need this book. In short, if you are involved in building applications, you will find much to learn in this book. Platform: |
Size: 2133144 |
Author:静水 |
Hits:
Description: 《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
Platform: |
Size: 3192939 |
Author:zhuymgis |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering. Platform: |
Size: 1405952 |
Author:周爽 |
Hits:
Description: If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building applications, you will find much to learn in this book.
-If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web- based or Win32- based, you need this book. Finally, if you are currently learning or building Micro soft.NET Framework-based applications. you need this book. In short, if you are involved in building applications, you will find much to learn in this book. Platform: |
Size: 2132992 |
Author:静水 |
Hits:
Description: 《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
Platform: |
Size: 3192832 |
Author: |
Hits:
Description: 得到确切的指导,以书面形式更安全代码的Windows Vista从作者获奖写作安全的代码,迈克尔霍华德和大卫勒布朗。这一提法是理想的开发谁了解基本的Windows编程和API -Get the definitive guide to writing more-secure code for Windows Vista—from the authors of the award-winning Writing Secure Code, Michael Howard and David LeBlanc. This reference is ideal for developers who understand the fundamentals of Windows programming and APIs. Platform: |
Size: 3192832 |
Author:wanxiaoyao |
Hits:
Description: 针对黑客攻击防范的编程技术,以及实践。
安全编码原则及实践。-Secure Coding: Principles & Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles & Practices looks at the problem of bad code in a new way. Packed with advice based on the authors decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Platform: |
Size: 644096 |
Author:lsx |
Hits:
Description: Writing Secure Code 英文版, 很好的原版书,读读吧-Writing Secure Code in English, very good original book Platform: |
Size: 3526656 |
Author:jiam |
Hits:
Description: 怎样编写安全可靠的程序,这是衡量一个程序员是否优秀的重要标准,本书对编程中的一些规范和一些陷阱进行了详细的分析,非常非常好!-how to Writing Secure Code ? it is very important problem for every programmer, this book give you many advises Platform: |
Size: 2128896 |
Author:钱宏 |
Hits:
Description: 编写安全的代码,每个程序员都需要掌握的最基本的安全常识-Writing Secure Code, every programmer needs to master the basic knowledge of the security Platform: |
Size: 2315264 |
Author:dengjunquan |
Hits:
Description: Spring Security是一个能够为基于Spring的企业应用系统提供描述性安全访问控制解决方案的安全框架。它提供了一组可以在Spring应用上下文中配置的Bean,充分利用了Spring IoC(依赖注入,也称控制反转)和AOP(面向切面编程)功能,为应用系统提供声明式的安全访问控制功能,减少了为企业系统安全控制编写大量重复代码的工作。-Spring Security for Spring-based enterprise applications systems provide descriptive secure access control solutions for the security framework. It provides a set of beans that can be configured in the Spring application context to take full advantage of the Spring IoC (dependency injection, also known as inversion of control) and AOP (Aspect Oriented Programming) function to provide the declarative security access control for application systems function, reduce the work of writing a lot of duplicate code for enterprise systems security control. Platform: |
Size: 894976 |
Author:晓东 |
Hits:
Description: 编写安全的代码2,微软出版社出版,和书配套原程序,很好(Writing secure code 2, Microsoft press, and form a complete set of the original book program, very good) Platform: |
Size: 172032 |
Author:avtefjhncc
|
Hits:
Description: 编写安全的代码2,微软出版社出版,和书配套原程序,很好(Writing secure code 2, Microsoft press, and form a complete set of the original book program, very good) Platform: |
Size: 172032 |
Author:Veraqbmr |
Hits: