SECURE COMPUTER SOFTWARE DEVELOPMENT : INTRODUCTION TO VULNERABILITY DETECTION TOOLS by Ron D McFarland Ph.D

SECURE COMPUTER SOFTWARE DEVELOPMENT : INTRODUCTION TO VULNERABILITY DETECTION TOOLS by Ron D McFarland Ph.D

Author:Ron D McFarland Ph.D.
Language: eng
Format: azw3, epub
Publisher: UNKNOWN
Published: 2016-12-06T08:00:00+00:00


Apple lists several core practices necessary for secure programming. These include (hyperlinks are embedded):

Avoiding Buffer Overflows and Underflows describes the various types of buffer overflows and explains how to avoid them.

Validating Input and Interprocess Communication discusses why and how you must validate every type of input your program receives from untrusted sources.

Race Conditions and Secure File Operations explains how race conditions occur, discusses ways to avoid them, and describes insecure and secure file operations.

Elevating Privileges Safely describes how to avoid running code with elevated privileges and what to do if you can’t avoid it entirely.

Designing Secure User Interfaces discusses how the user interface of a program can enhance or compromise security and gives some guidance on how to write a security-enhancing UI.

Designing Secure Helpers and Daemons describes how to design helper applications in ways that are conducive to privilege separation.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.