|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Christoph Kern , Anita Kesavan , Neil DaswaniPublisher: APress Imprint: APress Edition: 1st ed. Dimensions: Width: 19.10cm , Height: 1.80cm , Length: 23.50cm Weight: 0.635kg ISBN: 9781590597842ISBN 10: 1590597842 Pages: 292 Publication Date: 15 February 2007 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Awaiting stock The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you. Table of ContentsSecurity Design Principles.- Security Goals.- Secure Systems Design.- Secure Design Principles.- Exercises for Part 1.- Secure Programming Techniques.- Worms and Other Malware.- Buffer Overflows.- Client-State Manipulation.- SQL Injection.- Password Security.- Cross-Domain Security in Web Applications.- Exercises for Part 2.- to Cryptography.- Symmetric Key Cryptography.- Asymmetric Key Cryptography.- Key Management and Exchange.- MACs and Signatures.- Exercises for Part 3.ReviewsFrom the reviews: It is written based on a course for beginning programmers. The book has three main parts: security design principles, secure programming techniques, and an introduction to cryptography. Exercises are included at the end of each part in order to provide suggestions for getting hands-on experience. (A. Marien, ACM Computing Reviews, Vol. 49 (5), May, 2008) From the reviews: It is written based on a course for beginning programmers. ... The book has three main parts: security design principles, secure programming techniques, and an introduction to cryptography. ... Exercises are included at the end of each part in order to provide suggestions for getting hands-on experience. (A. Marien, ACM Computing Reviews, Vol. 49 (5), May, 2008) Author InformationChristoph Kern is an information security engineer at Google and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications, and helping product managers and software engineers effectively mitigate security risks in their software products. Tab Content 6Author Website:Countries AvailableAll regions |
||||