Adobe® Digital Editions software.This eBook requires the free
Before downloading this DRM-encrypted PDF, be sure to:
Also available in other formats.
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Secure Coding in C and C++. In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project."
--Frank Abagnale, author, lecturer, and leading consultant on fraud prevention and secure documents
Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's.
Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.
Coverage includes technical detail on how to
Secure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assistance.
About the Author.
1. Running with Scissors.
Gauging the Threat
C and C++
Common String Manipulation Errors
Process Memory Organization
3. Pointer Subterfuge.
Modifying the Instruction Pointer
Global Offset Table
The .dtors Section
The atexit() and on_exit() Functions
The longjmp() Function
4. Dynamic Memory Management.
Dynamic Memory Management
Common Dynamic Memory Management Errors
Doug Lea's Memory Allocator
5. Integer Security.
Integer Error Conditions
Nonexceptional Integer Logic Errors
6. Formatted Output.
Formatted Output Functions
Exploiting Formatted Output Functions
7. File I/O.
Time of Check, Time of Use
Files as Locks and File Locking
File System Exploits
8. Recommended Practices.
Secure Software Development Principles
Systems Quality Requirements Engineering
Architecture and Design
Defense in Depth
ONE MONTH ACCESS!
Get unlimited 30-day access to thousands of Books & Training Videos about technology, professional development and digital media If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months.