Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Foundations of Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Foundations of Security

Foundations of Security

What Every Programmer Needs to Know

Neil Daswani, Christoph Kern, Anita Kesavan - Collection The Expert's Voice in Security

290 pages, parution le 09/03/2007

Résumé

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems. Once you're enabled with the techniques covered in this book, you can start to alleviate some of the inherent vulnerabilities that make today's software so susceptible to attack. The book uses web servers and web applications as running examples throughout the book.

For the past few years, the Internet has had a "wild, wild west" flavor to it. Credit card numbers are stolen in massive numbers. Commercial web sites have been shut down by Internet worms. Poor privacy practices come to light and cause great embarrassment to the corporations behind them. All these security-related issues contribute at least to a lack of trust and loss of goodwill. Often there is a monetary cost as well, as companies scramble to clean up the mess when they get spotlighted by poor security practices.

It takes time to build trust with users, and trust is hard to win back. Security vulnerabilities get in the way of that trust. Foundations of Security: What Every Programmer Needs To Know helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.

  • The lead author cofounded the Stanford Center for Professional Development Computer Security Certification.
  • This book teaches you how to be more vigilant and develop a sixth sense for identifying and eliminating potential security vulnerabilities.
  • You'll receive hands-on code examples for a deep and practical understanding of security.
  • You'll learn enough about security to get the job done.

L'auteur - Neil Daswani

Neil Daswani has served in a variety of research, development, teaching, and managerial roles at Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). His areas of expertise include security, wireless data technology, and peer-to-peer systems. He has published extensively in these areas, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and he currently works for Google. He earned a bachelor's in computer science with honors with distinction from Columbia University.

L'auteur - Christoph Kern

Christoph Kern is an information security engineer at Google and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications, and helping product managers and software engineers effectively mitigate security risks in their software products.

L'auteur - Anita Kesavan

Anita Kesavan is a freelance writer and received her M.F.A. in creative writing from Sarah Lawrence College. She also holds a bachelor's in English from Illinois-Wesleyan University. She specializes in communicating complex technical ideas in simple, easy-to-understand language.

Sommaire

  • Security Design Principles
    • Security Goals
    • Secure Systems Design
    • Secure Design Principles
    • Exercises for Part 1
  • Secure Programming Techniques
    • Worms and Other Malware
    • Buffer Overflows
    • Client-State Manipulation
    • SQL Injection
    • Password Security
    • Cross-Domain Security in Web Applications Exercises for Part 2
  • Introduction to Cryptography
    • Symmetric Key Cryptography
    • Asymmetric Key Cryptography
    • Key Management and Exchange
    • MACs and Signatures
    • Exercises for Part 3
  • Appendixes
    • Defense-in-Depth: The FLI Model
    • Source Code Listings
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Apress
Auteur(s) Neil Daswani, Christoph Kern, Anita Kesavan
Collection The Expert's Voice in Security
Parution 09/03/2007
Nb. de pages 290
Format 18 x 23,5
Couverture Broché
Poids 612g
Intérieur Noir et Blanc
EAN13 9781590597842
ISBN13 978-1-59059-784-2

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription