Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More

Buy
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

We don't think we need to tell you that writing secure software is incredibly difficult, even for the experts. We're not going to waste any time trying to convince you to start thinking about security—we assume you're already doing that.

Our goal here is to provide you with a rich set of code samples that you can use to help secure the C and C++ programs you write, for both Unix[1] and Windows environments.

[1]We know Linux is not a true Unix, but we will lump it in there throughout this book for the sake of convenience.

There are already several other books out there on the topic of writing secure software. Many of them are quite good, but they universally focus on the fundamentals, not code. That is, they cover basic secure programming principles, and they usually explain how to design for security and perform risk assessments. Nevertheless, none of them show you by example how to do such things as SSL-enable your applications properly, which can be surprisingly difficult.

Fundamental software security skills are important, and everybody should master them. But, in this book, we assume that you already have the basics under your belt. We do talk about design considerations, but we do so compactly, focusing instead on getting the implementation details correct. If you need a more in-depth treatment of basic design principles, there are now several good books on this topic, including Building Secure Software (Addison Wesley). In addition, on this book's web site, we provide links to background resources that are available on the Internet.

(HTML tags aren't allowed.)

Physical-Layer Security: From Information Theory to Security Engineering
Physical-Layer Security: From Information Theory to Security Engineering
This book is the result of more than five years of intensive research in collaboration with a large number of people. Since the beginning, our goal has been to understand at a deeper level how information-theoretic security ideas can help build more secure networks and communication systems. Back in 2008, the actual planwas to...
Building Applications for the Mac App Store
Building Applications for the Mac App Store

In this Wrox Blox, you will learn how to obtain and access the Mac App Store from your Mac. You will also learn about the opportunities available for developers who want to venture into the Mac market. This Wrox Blox also walks you through the steps you need to perform to publish your apps in the Mac App Store. You will use the Xcode 4...

Digital Literacy: Tools and Methodologies for Information Society
Digital Literacy: Tools and Methodologies for Information Society
Currently in a state of cultural transition, global society is moving from a literary society to digital one, adopting widespread use of advanced technologies such as the Internet and mobile devices. Digital media has an extraordinary impact on society s formative processes, forcing a pragmatic shift in their management and organization....

The Collector's Guide to eBay
The Collector's Guide to eBay
From the start, eBay has been a collectors’ paradise. Among the first items put up for sale on eBay in the fall of 1995 were a Hubley toy dump truck and a Rolls Royce Silver Shadow motor car. In the ensuing decade, amateurs, antiques dealers, and entrepreneurs have all seized upon eBay as a way to make money and find buyers for their wares....
MCSA/MCSE Managing and Maintaining a Microsoft Windows® Server 2003 Environment Exam Cram™ 2 (Exam 70-290)
MCSA/MCSE Managing and Maintaining a Microsoft Windows® Server 2003 Environment Exam Cram™ 2 (Exam 70-290)

This Exam Cram 2 helps you pass the 70-290 exam, which is one of the four core exams in Microsoft's MCSE 2003 certification program as well as a core exam in the MCSA 2003 program. This book assumes that you have a solid foundation of knowledge but could use a refresher on important concepts, as well as a guide to exam topics and...

Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive systems are a technological building block supporting Big Data and Data Science applications.This book familiarizes readers with core concepts that they should be aware of before continuing with independent work and the more advanced technical reference literature that dominates the current landscape.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy