19 Deadly sins of software security: Programming flaws and how to fix them
Publication details: New Delhi Tata McGraw-Hill Publishing company limited 2005 Description: 1-281ISBN: 0-07-060716-8Subject(s): Computer scienceDDC classification: 001.6425 Summary: 1. Buffer overruns 2. Format string problems 3. Integer overflows 4. SQL injection 5. Command injection 6. Failing to handle errors 7. Cross site scripting 8. Failing to protect network traffic 9. Use of magic URLs and hidden form fields 10. Improper use of SSL and TLS 11. Use of weak password-based systems 12. Failing to store and protect data security 13. Information leakage 14. Improper file access 15. Trusting network name resolution 16. Race conditions 17. Unauthenticated key exchange 18. Cryptographically strong random numbers 19. Poor usabilityItem type | Home library | Call number | Materials specified | Status | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
Parvatibai Chowgule College of Arts and Science, Margao Computer Science | 001.6425 HOW/Nin (Browse shelf(Opens below)) | Available | PCC-37536 |
Browsing Parvatibai Chowgule College of Arts and Science, Margao shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
001.6425 GOD.BEL Cyber Security | 001.6425 GUN/MAS SQL Server 2000 | 001.6425 HEA/Emb Embedded Systems Design | 001.6425 HOW/Nin 19 Deadly sins of software security: Programming flaws and how to fix them | 001.6425 HUM/Man Managing the software process | 001.6425 JAL/CMM CMM in practice: Processes for executing software projects at infosys | 001.64404 BEA.NIL A Practical guide to Advanced Networking |
1. Buffer overruns
2. Format string problems
3. Integer overflows
4. SQL injection
5. Command injection
6. Failing to handle errors
7. Cross site scripting
8. Failing to protect network traffic
9. Use of magic URLs and hidden form fields
10. Improper use of SSL and TLS
11. Use of weak password-based systems
12. Failing to store and protect data security
13. Information leakage
14. Improper file access
15. Trusting network name resolution
16. Race conditions
17. Unauthenticated key exchange
18. Cryptographically strong random numbers
19. Poor usability
There are no comments on this title.