Secure Programming with Static Analysis

Valutazione media 3,69
( su 13 valutazioni fornite da GoodReads )
 
9780321424778: Secure Programming with Static Analysis

The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process "We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software." -Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language "'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know." -David Wagner, Associate Professor, University of California Berkeley "Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited." -Howard A. Schmidt, Former White House Cyber Security Advisor BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects. JACOB WEST manages Fortify Software's Security Research Group, which is responsible for building security knowledge into Fortify's products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail. CD contains a working demonstration version of Fortify Software's Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format. Part I: Software Security and Static Analysis 1 1 The Software Security Problem 3 2 Introduction to Static Analysis 21 3 Static Analysis as Part of the Code Review Process 47 4 Static Analysis Internals 71 Part II: Pervasive Problems 115 5 Handling Input 117 6 Buffer Overflow 175 7 Bride of Buffer Overflow 235 8 Errors and Exceptions 265 Part III: Features and Flavors 295 9 Web Applications 297 10 XML and Web Services 349 11 Privacy and Secrets 379 12 Privileged Programs 421 Part IV: Static Analysis in Practice 457 13 Source Code Analysis Exercises for Java 459 14 Source Code Analysis Exercises for C 503 Epilogue 541 References 545 Index 559

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

1.

Chess, Brian; West, Jacob
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Paperback Quantità: 1
Da
AMAZINGBOOKDEALS
(IRVING, TX, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Paperback. Condizione libro: BRAND NEW. BRAND NEW. Fast Shipping. Prompt Customer Service. Satisfaction guaranteed. Codice libro della libreria 0321424778BNA

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 36,64
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,67
In U.S.A.
Destinazione, tempi e costi

2.

Brian ChessJacob West
Editore: Prentice Hall
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: > 20
Da
INDOO
(Avenel, NJ, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Prentice Hall. Condizione libro: New. Brand New. Codice libro della libreria 0321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 43,68
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,22
In U.S.A.
Destinazione, tempi e costi

3.

Brian Chess, Jacob West
Editore: Pearson Education (US), United States (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: 1
Da
The Book Depository US
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education (US), United States, 2007. Mixed media product. Condizione libro: New. 229 x 175 mm. Language: English . Brand New Book. The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there s a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software. -Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language Secure Programming with Static Analysis is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know. -David Wagner, Associate Professor, University of California Berkeley Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited. -Howard A. Schmidt, Former White House Cyber Security Advisor BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects. JACOB WEST manages Fortify Software s Security Research Group, which is responsible for building security knowledge into Fortify s products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail. CD contains a working demonstration version of Fortify Software s Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format. Part I: Software Security and Static Analysis 1 1 The Software Security Problem 3 2 Introduction to Static Analysis 21 3 Static Analysis as Part of the Code Review Process 47 4 Static Analysis Internals 71 Part II: Pervasive Problems 115 5 Handling Input 117 6 Buffer Overflow 175 7 Bride of Buffer Overflow 235 8 Errors and Exceptions 265 Part III: Features and Flavors 295 9 Web A. Codice libro della libreria AAC9780321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 50,43
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

4.

Brian Chess, Jacob West
Editore: Pearson Education (US), United States (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: 1
Da
The Book Depository
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education (US), United States, 2007. Mixed media product. Condizione libro: New. 229 x 175 mm. Language: English . Brand New Book. The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there s a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software. -Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language Secure Programming with Static Analysis is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know. -David Wagner, Associate Professor, University of California Berkeley Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited. -Howard A. Schmidt, Former White House Cyber Security Advisor BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects. JACOB WEST manages Fortify Software s Security Research Group, which is responsible for building security knowledge into Fortify s products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail. CD contains a working demonstration version of Fortify Software s Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format. Part I: Software Security and Static Analysis 1 1 The Software Security Problem 3 2 Introduction to Static Analysis 21 3 Static Analysis as Part of the Code Review Process 47 4 Static Analysis Internals 71 Part II: Pervasive Problems 115 5 Handling Input 117 6 Buffer Overflow 175 7 Bride of Buffer Overflow 235 8 Errors and Exceptions 265 Part III: Features and Flavors 295 9 Web A. Codice libro della libreria AAC9780321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 53,73
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

5.

Jacob West and Brian Chess
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: 1
Da
Castle Rock
(Pittsford, NY, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Condizione libro: Brand New. Book Condition: Brand New. Codice libro della libreria 97803214247781.0

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 52,34
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,67
In U.S.A.
Destinazione, tempi e costi

6.

Chess, Brian
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: 1
Da
PBShop
(Wood Dale, IL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro 2007. PAP. Condizione libro: New. New Book.Shipped from US within 10 to 14 business days. Established seller since 2000. Codice libro della libreria IB-9780321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 52,54
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,67
In U.S.A.
Destinazione, tempi e costi

7.

Brian Chess
Editore: Pearson Education (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Quantità: 1
Da
Books2Anywhere
(Fairford, GLOS, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education, 2007. UNK. Condizione libro: New. New Book. Shipped from US within 10 to 14 business days. Established seller since 2000. Codice libro della libreria IB-9780321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 52,72
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 10,68
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

8.

Chess, Brian, West, Jacob
Editore: Addison-Wesley Professional (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Paperback Quantità: 2
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2007. Paperback. Condizione libro: New. Codice libro della libreria P110321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 64,37
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,75
In U.S.A.
Destinazione, tempi e costi

9.

Brian Chess; Jacob West
Editore: Addison-Wesley Professional (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Paperback Quantità: 1
Da
Irish Booksellers
(Rumford, ME, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2007. Paperback. Condizione libro: New. book. Codice libro della libreria 0321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 67,55
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

10.

Chess, Brian
Editore: Addison-Wesley Professional (2007)
ISBN 10: 0321424778 ISBN 13: 9780321424778
Nuovi Paperback Quantità: 1
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2007. Paperback. Condizione libro: New. Codice libro della libreria 0321424778

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 65,10
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,75
In U.S.A.
Destinazione, tempi e costi

Vedi altre copie di questo libro

Vedi tutti i risultati per questo libro