Langsung ke konten utama

Secure Programming with Static Analysis (9780321424778)



The First Expert Guide to Static Analysis for Software Security!

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers.

Coverage includes:

Why conventional bug-catching often misses security problems

How static analysis can help programmers get security right

The critical attributes and algorithms that make or break a static analysis tool

36 techniques for making static analysis more effective on your code

More than 70 types of serious security vulnerabilities, with specific solutions

Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more

Techniques for handling untrusted input

Eliminating buffer overflows: tactical and strategic approaches

Avoiding errors specific to Web applications, Web services, and Ajax

Security-aware logging, debugging, and error/exception handling

Creating, maintaining, and sharing secrets and confidential information

Detailed tutorials that walk you through the static analysis process

"We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software."

-Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language

"'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know."

-David Wagner, Associate Professor, University of California Berkeley

"Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited."

-Howard A. Schmidt, Former White House Cyber Security Advisor

BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects.

JACOB WEST manages Fortify Software's Security Research Group, which is responsible for building security knowledge into Fortify's products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail.

CD contains a working demonstration version of Fortify Software's Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format.

Part I: Software Security and Static Analysis 1

1 The Software Security Problem 3

2 Introduction to Static Analysis 21

3 Static Analysis as Part of the Code Review Process 47

4 Static Analysis Internals 71

Part II: Pervasive Problems 115

5 Handling Input 117

6 Buffer Overflow 175

7 Bride of Buffer Overflow 235

8 Errors and Exceptions 265

Part III: Features and Flavors 295

9 Web Applications 297

10 XML and Web Services 349

11 Privacy and Secrets 379

12 Privileged Programs 421

Part IV: Static Analysis in Practice 457

13 Source Code Analysis Exercises for Java 459

14 Source Code Analysis Exercises for C 503

Epilogue 541

References 545

Index 559


Product details

  • Mixed media product | 624 pages
  • 176 x 234 x 30mm | 892g
  • Addison-Wesley Educational Publishers Inc
  • New Jersey, United States
  • English
  • Illustrations, map
  • 0321424778
  • 9780321424778
  • 1,070,983


Download Secure Programming with Static Analysis (9780321424778).pdf, available at ebookdownloadfree.co for free.

GET FREE NOW

Komentar

Postingan populer dari blog ini

Toward a Geography of Art (9780226133119)

Art history traditionally classifics works of art by country as well as period, but often political borders and cultural boundaries are highly complex and fluid. Questions of identity, policy, and exchange make it difficult to determine the "place" of art, and often the art itself results from these conflicts of geography and culture. Addressing an important approach to art history, Thomas DaCosta Kaufmann's book offers essays that focus on the intricacies of accounting for the geographical dimension of art history during the early modern period in Europe, Latin America, and Asia. Toward a Geography of Art presents a historical overview of these complexities, debates contemporary concerns, and completes its exploration with a diverse collection of case studies. Employing the author's expertise in a variety of fields, the book delves into critical issues such as transculturation of indigenous traditions, mestizaje, the artistic metropolis, artistic diffusion, transfer,

A Treatise of Human Nature : Being an Attempt to Introduce the Experimental Method of Reasoning into Moral Subjects (9780198751724)

A Treatise of Human Nature (1739-40), David Hume's comprehensive attempt to base philosophy on a new, observationally grounded study of human nature, is one of the most important texts in Western philosophy. It is also the focal point of current attempts to understand 18th-century philosophy. The Treatise first explains how we form such concepts as cause and effect, external existence, and personal identity, and to form compelling but unconfirmable beliefs in the entities represented by these concepts. It then offers a novel account of the passions, explains freedom and necessity as they apply to human choices and actions, and concludes with detailed explanations of how we distinguish between virtue and vice and of the different kinds of virtue. Hume's Abstract of the Treatise, also included in the volume, outlines his 'chief argument' regarding our conception of, and belief in, cause and effect. The texts printed in this volume are those of the critical edition of Hum

[📖PDF] Ruthless (Pretty Little Liars, Book 10) 006208187X Herunterladen Für Kostenlosem Lesefutter eBook Reader

Herunterladen Für Kostenlose Ruthless (Pretty Little Liars, Book 10).pdf 006208187X downloaden eBook Reader Jetzt Herunterladen Ruthless (Pretty Little Liars, Book 10).pdf , Verfügbar @ https://ebookdownloadfree.co Für Kostenlose. DOWNLOAD FREE NOW Gratis eBooks: Jetzt kostenlos downloaden Ruthless (Pretty Little Liars, Book 10).pdf 006208187X by Damit du dich nicht lange durch das Internet quälen musst, haben wir die besten Quellen für gratis eBooks Ruthless (Pretty Little Liars, Book 10).pdf 006208187X by hier übersichtlich aufbereitet. Güngstig einsteigen ins digitale LesenSie suchen nach kostenlosem Lesefutter für Ihren eBook Reader Ruthless (Pretty Little Liars, Book 10).pdf 006208187X by ? Oder möchten eBooks Ruthless (Pretty Little Liars, Book 10).pdf 006208187X by gratis und ganz unverbindlich testen? Stöbern Sie jetzt durch unsere große Auswahl an Gratis Ruthless (Pretty Little Liars, Book 10).pdf 006208187X by eBooks und füllen Sie Ihre digitale Bibliothek mit tollen eBo