Foundations of Security
Apress (Verlag)
978-1-59059-784-2 (ISBN)
For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices.
It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.
The lead author co-founded the Stanford Center for Professional Development Computer Security Certification.
This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities.
You'll receive hands-on code examples for a deep and practical understanding of security.
You'll learn enough about security to get the job done.
Christoph Kern is an information security engineer at Google and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications, and helping product managers and software engineers effectively mitigate security risks in their software products.
Security Design Principles.- Security Goals.- Secure Systems Design.- Secure Design Principles.- Exercises for Part 1.- Secure Programming Techniques.- Worms and Other Malware.- Buffer Overflows.- Client-State Manipulation.- SQL Injection.- Password Security.- Cross-Domain Security in Web Applications.- Exercises for Part 2.- to Cryptography.- Symmetric Key Cryptography.- Asymmetric Key Cryptography.- Key Management and Exchange.- MACs and Signatures.- Exercises for Part 3.
Erscheint lt. Verlag | 15.2.2007 |
---|---|
Zusatzinfo | 22 Illustrations, black and white; XXVII, 292 p. 22 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 191 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-59059-784-2 / 1590597842 |
ISBN-13 | 978-1-59059-784-2 / 9781590597842 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich