Download Secure Coding in C and C++ (2nd Edition) (SEI Series in Software Engineering) PDF EPUB
Author: Author
Pages: 608
Size: 1.200,62 Kb
Publication Date: April 12,2013
Category: C
Find out the Root Factors behind Software program Vulnerabilities and How to prevent Them
Â
Commonly exploited software vulnerabilities are often caused by avoidable software program defects. Having analyzed thousands of vulnerability reviews since 1988, CERT offers determined a relatively few root causes take into account the majority of the vulnerabilities.
Â
 gong3deng “> gong0deng gong4deng Secure Coding in C and C++, Second Edition, gong5deng gong1deng identifies and explains these root causes and shows the steps that can be taken to prevent exploitation.”> Â
Coverage includes technical details on how best to
- Enhance the overall protection of any C or C++ program
- Thwart buffer overflows, stack-smashing, and return-oriented programming episodes that exploit insecure string manipulation logic
- Avoid vulnerabilities and security flaws caused by the incorrect usage of dynamic memory administration features
- Eliminate integer-related problems caused by signed integer overflows, unsigned integer wrapping, and truncation mistakes
- Perform protected I/O, avoiding file program vulnerabilities
- Correctly make use of formatted output features without presenting format-string vulnerabilities
- Avoid race circumstances and additional exploitable vulnerabilities while developing concurrent code
Â
Â
The next edition features
- Improvements for C11 and C++11
- Significant revisions to chapters on strings, dynamic memory administration, and integer protection
- A fresh chapter on concurrency
- Usage of the web secure coding course provided through Carnegie Mellon’s Open up Learning Initiative (OLI)
Protected Coding in C and C++, Second Edition, presents a huge selection of examples of protected code, insecure code, and exploits, implemented for Home windows and Linux. If you’re in charge of creating protected C or C++ software program–or for keeping it secure–no other book gives you this very much detailed, expert help.