Foundations of Security: What Every Programmer Needs to Know / Edition 1

Foundations of Security: What Every Programmer Needs to Know / Edition 1

ISBN-10:
1590597842
ISBN-13:
9781590597842
Pub. Date:
02/15/2007
Publisher:
Apress
ISBN-10:
1590597842
ISBN-13:
9781590597842
Pub. Date:
02/15/2007
Publisher:
Apress
Foundations of Security: What Every Programmer Needs to Know / Edition 1

Foundations of Security: What Every Programmer Needs to Know / Edition 1

$79.99 Current price is , Original price is $79.99. You
$79.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
$69.99 
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    • Condition: Good
    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that’s exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.


Product Details

ISBN-13: 9781590597842
Publisher: Apress
Publication date: 02/15/2007
Series: Expert's Voice Series
Edition description: 1st ed.
Pages: 292
Product dimensions: 6.90(w) x 9.10(h) x 0.90(d)

About the Author

Christoph Kern is an information security engineer at Google and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications, and helping product managers and software engineers effectively mitigate security risks in their software products.

Table of Contents

• Security Goals
• Secure Systems Design
• Secure Design Principles
• Exercises for Part 1
• Worms and Other Malware
• Buffer Overflows
• Client-State Manipulation
• SQL Injection
• Password Security
• Cross-Domain Security in Web Applications
• Exercises for Part 2
• Symmetric Key Cryptography
• Asymmetric Key Cryptography
• Key Management and Exchange
• MACs and Signatures
• Exercises for Part 3
From the B&N Reads Blog

Customer Reviews