Wonder Club world wonders pyramid logo
×

Secure Coding in C and C++ Book

Secure Coding in C and C++
Secure Coding in C and C++, , Secure Coding in C and C++ has a rating of 4 stars
   2 Ratings
X
Secure Coding in C and C++, , Secure Coding in C and C++
4 out of 5 stars based on 2 reviews
5
50 %
4
0 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Secure Coding in C and C++
  • Written by author Robert C. Seacord
  • Published by Addison-Wesley, September 2005
  • "The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our syst
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Foreword.

Preface.

About the Author.

1. Running with Scissors.

Gauging the Threat

Security Concepts

C and C++

Development Platforms

Summary

Further Reading

2. Strings.

String Characteristics

Common String Manipulation Errors

String Vulnerabilities

Process Memory Organization

Stack Smashing

Code Injection

Arc Injection

Mitigation Strategies

Notable Vulnerabilities

Summary

Further Reading

3. Pointer Subterfuge.

Data Locations

Function Pointers

Data Pointers

Modifying the Instruction Pointer

Global Offset Table

The .dtors Section

Virtual Pointers

The atexit() and on_exit() Functions

The longjmp() Function

Exception Handling

Mitigation Strategies

Summary

Further Reading

4. Dynamic Memory Management.

Dynamic Memory Management

Common Dynamic Memory Management Errors

Doug Lea's Memory Allocator

RtlHeap

Mitigation Strategies

Notable Vulnerabilities

Summary

Further Reading

5. Integer Security.

Integers

Integer Conversions

Integer Error Conditions

Integer Operations

Vulnerabilities

Nonexceptional Integer Logic Errors

Mitigation Strategies

Notable Vulnerabilities

Summary

Further Reading

6. Formatted Output.

Variadic Functions

Formatted Output Functions

Exploiting Formatted Output Functions

Stack Randomization

Mitigation Strategies

Notable Vulnerabilities

Summary

Further Reading

7. File I/O.

Concurrency

Time of Check, Time of Use

Files as Locks and File Locking

File System Exploits

Mitigation Strategies

Summary

8.Recommended Practices.

Secure Software Development Principles

Systems Quality Requirements Engineering

Threat Modeling

Use/Misuse Cases

Architecture and Design

Off-the-Shelf Software

Compiler Checks

Input Validation

Data Sanitization

Static Analysis

Quality Assurance

Memory Permissions

Defense in Depth

TSP-Secure

Summary

Further Reading

References.

Acronyms.

Index.

 


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Secure Coding in C and C++, , Secure Coding in C and C++

X
WonderClub Home

This item is in your Collection

Secure Coding in C and C++, , Secure Coding in C and C++

Secure Coding in C and C++

X
WonderClub Home

This Item is in Your Inventory

Secure Coding in C and C++, , Secure Coding in C and C++

Secure Coding in C and C++

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: