Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven principles, strategies, and coding techniques. The authors two battle-scarred veterans who have solved some of the industry s toughest security problems provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft(r) .NET security, and Microsoft ActiveX(r) development, plus practical checklists for developers, testers, and program managers.
P128 As Sun Tzu wrote in The Art of War, "Know your enemy as you know yourself, and success will be assured." 知己知彼,百战不殆。八个字的中文翻译成了一长句英文,而且还言不及义。可以说这是汉语的魅力所在么?又回想起了柏杨说的汉字拼音化……
评分P128 As Sun Tzu wrote in The Art of War, "Know your enemy as you know yourself, and success will be assured." 知己知彼,百战不殆。八个字的中文翻译成了一长句英文,而且还言不及义。可以说这是汉语的魅力所在么?又回想起了柏杨说的汉字拼音化……
评分Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book Developers will learn how to padlock their applications throughout the entire development process -- from designing secure applications to writing robust code...
评分P128 As Sun Tzu wrote in The Art of War, "Know your enemy as you know yourself, and success will be assured." 知己知彼,百战不殆。八个字的中文翻译成了一长句英文,而且还言不及义。可以说这是汉语的魅力所在么?又回想起了柏杨说的汉字拼音化……
评分Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book Developers will learn how to padlock their applications throughout the entire development process -- from designing secure applications to writing robust code...
the book is for the programmer, written by the engineers in Microsoft. Comprehensive, enomerous knowledge
评分the book is for the programmer, written by the engineers in Microsoft. Comprehensive, enomerous knowledge
评分感觉这本书适合大型项目,从项目架构开始行架构的安全审计,到项目开发过程通过一些最佳实践避免很多安全问题,项目开发之后进行安全测试,最后还要进行文档化,如何进行安全部署等。虽然之前听过很多次堆栈溢出之类的词语,通过这本书还是第一次了解到具体的攻击过程以及对应原理。
评分感觉这本书适合大型项目,从项目架构开始行架构的安全审计,到项目开发过程通过一些最佳实践避免很多安全问题,项目开发之后进行安全测试,最后还要进行文档化,如何进行安全部署等。虽然之前听过很多次堆栈溢出之类的词语,通过这本书还是第一次了解到具体的攻击过程以及对应原理。
评分感觉这本书适合大型项目,从项目架构开始行架构的安全审计,到项目开发过程通过一些最佳实践避免很多安全问题,项目开发之后进行安全测试,最后还要进行文档化,如何进行安全部署等。虽然之前听过很多次堆栈溢出之类的词语,通过这本书还是第一次了解到具体的攻击过程以及对应原理。
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有