Star Wars Sale
 
 

Special Offers see all

Enter to WIN!

Weekly drawing for $100 credit. Subscribe to PowellsBooks.news for a chance to win.
Privacy Policy

More at Powell's


Recently Viewed clear list


Original Essays | June 20, 2014

Lisa Howorth: IMG So Many Books, So Many Writers



I'm not a bookseller, but I'm married to one, and Square Books is a family. And we all know about families and how hard it is to disassociate... Continue »
  1. $18.20 Sale Hardcover add to wish list

    Flying Shoes

    Lisa Howorth 9781620403013

spacer
Qualifying orders ship free.
$61.25
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Remote Warehouse Networking- Computer Security

This title in other editions

Other titles in the SEI Series in Software Engineering series:

Secure Coding in C and C++ (SEI Series in Software Engineering)

by

Secure Coding in C and C++ (SEI Series in Software Engineering) Cover

 

Synopses & Reviews

Publisher Comments:

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Secure Coding in C and C++. In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project."

--Frank Abagnale, author, lecturer, and leading consultant on fraud prevention and secure documentsLearn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's.

Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Coverage includes technical detail on how to

  • Improve the overall security of any C/C++ application
  • Thwart buffer overflows and stack-smashing attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems: integer overflows, sign errors, and truncation errors
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid I/O vulnerabilities, including race conditions

Secure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assistance.

About the Author

Robert Seacord began programming (professionally) for IBM in 1982 and has been programming in C since 1985, and in C++ since 1992. Robert is currently a Senior Vulnerability Analyst with the CERT/Coordination Center at the Software Engineering Institute (SEI). He is coauthor of Building Systems from Commercial Components (Addison-Wesley, 2002) and Modernizing Legacy Systems (Addison-Wesley, 2003). The CERT/CC, among other security-related activities, regularly analyzes software vulnerability reports and assesses the risk to the Internet and other critical infrastructure.

Table of Contents

Foreword.

Preface.

About the Author.

1. Running with Scissors.

    Gauging the Threat

    Security Concepts

    C and C++

    Development Platforms

    Summary

    Further Reading

2. Strings.

    String Characteristics

    Common String Manipulation Errors

    String Vulnerabilities

    Process Memory Organization

    Stack Smashing

    Code Injection

    Arc Injection

    Mitigation Strategies

    Notable Vulnerabilities

    Summary

    Further Reading

3. Pointer Subterfuge.

    Data Locations

    Function Pointers

    Data Pointers

    Modifying the Instruction Pointer

    Global Offset Table

    The .dtors Section

    Virtual Pointers

    The atexit() and on_exit() Functions

    The longjmp() Function

    Exception Handling

    Mitigation Strategies

    Summary

    Further Reading

4. Dynamic Memory Management.

    Dynamic Memory Management

    Common Dynamic Memory Management Errors

    Doug Lea's Memory Allocator

    RtlHeap

    Mitigation Strategies

    Notable Vulnerabilities

    Summary

    Further Reading

5. Integer Security.

    Integers

    Integer Conversions

    Integer Error Conditions

    Integer Operations

    Vulnerabilities

    Nonexceptional Integer Logic Errors

    Mitigation Strategies

    Notable Vulnerabilities

    Summary

    Further Reading

6. Formatted Output.

    Variadic Functions

    Formatted Output Functions

    Exploiting Formatted Output Functions

    Stack Randomization

    Mitigation Strategies

    Notable Vulnerabilities

    Summary

    Further Reading

7. File I/O.

    Concurrency

    Time of Check, Time of Use

    Files as Locks and File Locking

    File System Exploits

    Mitigation Strategies

    Summary

8. Recommended Practices.

    Secure Software Development Principles

    Systems Quality Requirements Engineering

    Threat Modeling

    Use/Misuse Cases

    Architecture and Design

    Off-the-Shelf Software

    Compiler Checks

    Input Validation

    Data Sanitization

    Static Analysis

    Quality Assurance

    Memory Permissions

    Defense in Depth

    TSP-Secure

    Summary

    Further Reading

References.

Acronyms.

Index.

 

Product Details

ISBN:
9780321335722
Author:
Seacord, Robert C.
Publisher:
Addison-Wesley Professional
Subject:
Programming Languages - C
Subject:
C (computer program language)
Subject:
Security
Subject:
Security - General
Subject:
Computer security
Subject:
Networking-Computer Security
Copyright:
Edition Description:
Trade paper
Series:
SEI Series in Software Engineering
Publication Date:
September 2005
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Y
Pages:
368
Dimensions:
9.24 x 7 x 0.76 in 608 gr

Other books you might like

  1. Mythical Man Month Essays on Softwar... Used Trade Paper $27.00
  2. Fall: A Comparative Study of the End... New Hardcover $159.25
  3. Symphonies Nos. 1 and 2 in Full Score New Trade Paper $22.95
  4. Why Buildings Stand Up the Strength... Used Trade Paper $6.00
  5. Writing Secure Code 2ND Edition Used Trade Paper $11.95
  6. Gustav Mahler: The Symphonies Used Trade Paper $13.95

Related Subjects

» Computers and Internet » Computer Languages » C
» Computers and Internet » Computer Languages » C++
» Computers and Internet » Networking » Computer Security

Secure Coding in C and C++ (SEI Series in Software Engineering) New Trade Paper
0 stars - 0 reviews
$61.25 In Stock
Product details 368 pages Addison-Wesley Professional - English 9780321335722 Reviews:
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.