Photo 1 sur 1

Galerie
Photo 1 sur 1

Vous en avez un à vendre?
24 péchés capitaux de la sécurité logicielle : failles de programmation et comment les corriger : neuf
59,82 $US
Environ82,47 $C
État :
Entièrement neuf
Un livre neuf, non lu, non utilisé et en parfait état, sans aucune page manquante ni endommagée.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Expédition :
Sans frais Standard Shipping.
Lieu : Sparks, Nevada, États-Unis
Livraison :
Livraison prévue entre le jeu. 7 août et le mar. 12 août à 94104
Renvois :
Renvoi sous 30 jours. L'acheteur paie les frais de renvoi. Si vous utilisez une étiquette d'envoi eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
Magasinez en toute confiance
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :284283671808
Dernière mise à jour : avr. 28, 2024 08:58:11 HAEAfficher toutes les modificationsAfficher toutes les modifications
Caractéristiques de l'objet
- État
- Book Title
- 24 Deadly Sins of Software Security: Programming Flaws and How to
- Publication Date
- 2009-09-24
- Pages
- 432
- ISBN
- 9780071626750
À propos de ce produit
Product Identifiers
Publisher
Mcgraw-Hill Education
ISBN-10
0071626751
ISBN-13
9780071626750
eBay Product ID (ePID)
72678414
Product Key Features
Number of Pages
432 Pages
Publication Name
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Language
English
Publication Year
2009
Subject
Programming / General, Networking / General, Security / General, General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
0.9 in
Item Weight
26.3 Oz
Item Length
9.2 in
Item Width
7.4 in
Additional Product Features
Intended Audience
Trade
LCCN
2009-031994
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Part I: Web Application Sins ; Chapter 1: SQL Injection; Chapter 2: Server Side Cross-Site Scripting; Chapter 3: Web-Client Related Vulnerabilities; Part II: Implementation Sins ; Chapter 4: Use of Magic URLs Chapter 5: Buffer Overruns; Chapter 6: Format String Problems; Chapter 7: Integer Overflows; Chapter 8: C++ Catastrophes; Chapter 9: Catching All Exceptions; Chapter 10: Command Injection; Chapter 11: Failure to Handle Errors; Chapter 12: Information Leakage; Chapter 13: Race Conditions; Chapter 14: Poor Usability; Chapter 15: Not Updating Easily; Part III: Cryptographic Sins ; Chapter 16: Not Using Least Priveleges; Chapter 17: Weak Password Systems; Chapter 18: Unauthenticated Key Exchange; Chapter 19: Random Numbers; Part IV: Networking Sins ;Chapter 20: Wrong Algorithm; Chapter 21: Failure to Protect Network Traffic; Chapter 22: Trusting Name Resolution; Part V: Stored Data Sins ; Chapter 23: Improper Use of SSL/TLS; Chapter 24: Failure to Protect Stored Data
Synopsis
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution
LC Classification Number
QA76.9.A25H6977 2009
Description de l'objet du vendeur
Évaluations comme vendeur (513 657)
- m***m (2297)- Évaluation laissée par l'acheteur.Six derniers moisAchat vérifiéI’m thrilled with my recent purchase . The website was user-friendly, and the product descriptions were accurate. Customer service was prompt and helpful, answering all my questions. My order arrived quickly, well-packaged, and the product exceeded my expectations in quality. I’m impressed with the attention to detail and the overall experience. I’ll definitely shop here again and highly recommend from this seller to others. Thank you for a fantastic experience!
- a***n (43)- Évaluation laissée par l'acheteur.Six derniers moisAchat vérifiéMistakenly ordered a paperback that I thought was a hardcover, not sellers fault; it was described properly on the listing. Seller still processed a refund the day I went to return the item and let me keep the item anyway. A+++ service. Book arrived quickly in great condition and for a great price. Thank you so much! Amazing seller!
- n***c (94)- Évaluation laissée par l'acheteur.Six derniers moisAchat vérifiéseller was communicative about my shipment, media mail took a while and tracking wasn't updated frequently, but seller communicated to me very quickly on status. the item came new and wrapped as described, though the packaging in it was packed wasn't sturdy and falling apart when it got to me.
Évaluations et avis sur le produit
Avis les plus pertinents
- janv. 11, 2023
Good for laying a foundation of understanding within the field of software security
Achat vérifié : OuiÉtat : OccasionVendu par : havilahgold
- avr. 25, 2024
Good
Achat vérifié : OuiÉtat : OccasionVendu par : second.sale