Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven principles, strategies, and coding techniques. The authors two battle-scarred veterans who have solved some of the industry s toughest security problems provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft(r) .NET security, and Microsoft ActiveX(r) development, plus practical checklists for developers, testers, and program managers.
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book Developers will learn how to padlock their applications throughout the entire development process -- from designing secure applications to writing robust code...
評分Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book Developers will learn how to padlock their applications throughout the entire development process -- from designing secure applications to writing robust code...
評分P128 As Sun Tzu wrote in The Art of War, "Know your enemy as you know yourself, and success will be assured." 知己知彼,百战不殆。八个字的中文翻译成了一长句英文,而且还言不及义。可以说这是汉语的魅力所在么?又回想起了柏杨说的汉字拼音化……
評分P128 As Sun Tzu wrote in The Art of War, "Know your enemy as you know yourself, and success will be assured." 知己知彼,百战不殆。八个字的中文翻译成了一长句英文,而且还言不及义。可以说这是汉语的魅力所在么?又回想起了柏杨说的汉字拼音化……
評分Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book Developers will learn how to padlock their applications throughout the entire development process -- from designing secure applications to writing robust code...
感覺這本書適閤大型項目,從項目架構開始行架構的安全審計,到項目開發過程通過一些最佳實踐避免很多安全問題,項目開發之後進行安全測試,最後還要進行文檔化,如何進行安全部署等。雖然之前聽過很多次堆棧溢齣之類的詞語,通過這本書還是第一次瞭解到具體的攻擊過程以及對應原理。
评分the book is for the programmer, written by the engineers in Microsoft. Comprehensive, enomerous knowledge
评分感覺這本書適閤大型項目,從項目架構開始行架構的安全審計,到項目開發過程通過一些最佳實踐避免很多安全問題,項目開發之後進行安全測試,最後還要進行文檔化,如何進行安全部署等。雖然之前聽過很多次堆棧溢齣之類的詞語,通過這本書還是第一次瞭解到具體的攻擊過程以及對應原理。
评分the book is for the programmer, written by the engineers in Microsoft. Comprehensive, enomerous knowledge
评分the book is for the programmer, written by the engineers in Microsoft. Comprehensive, enomerous knowledge
本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有