free tracker

The Cert Oracle Secure Coding Standard For Java

Pub Date : 2012 | Author : Fred Long | Publisher : Addison-Wesley Professional

ISBN 10 : 9780321803955
ISBN 13 : 0321803957

The only comprehensive set of guidelines for secure Java programming - from the field's leading organizations, CERT and Oracle • •Authoritative, end-to-end code-level requireme..


Java Coding Guidelines

Pub Date : 2013-08-23 | Author : Fred Long | Publisher : Addison-Wesley

ISBN 10 : 9780133439540
ISBN 13 : 0133439542

“A must-read for all Java developers. . . . Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic..


Secure Coding In C And C

Pub Date : 2013-03-23 | Author : Robert C. Seacord | Publisher : Addison-Wesley

ISBN 10 : 9780132981972
ISBN 13 : 0132981971

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyze..


Secure Coding

Pub Date : 2003 | Author : Mark Graff | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 0596002424
ISBN 13 : 9780596002428

The authors look at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly rea..


Iron Clad Java

Pub Date : 2014-09-12 | Author : Jim Manico | Publisher : McGraw Hill Professional

ISBN 10 : 9780071835893
ISBN 13 : 007183589X

Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries describe..


C Coding Standards

Pub Date : 2004-10-25 | Author : Herb Sutter | Publisher : Pearson Education

ISBN 10 : 0132654423
ISBN 13 : 9780132654425

Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintena..


Practical Malware Analysis

Pub Date : 2012 | Author : Michael Sikorski | Publisher : No Starch Press

ISBN 10 : 9781593272906
ISBN 13 : 1593272901

Introduces tools and techniques for analyzing and debugging malicious software, discussing how to set up a safe virtual environment, overcome malware tricks, and use five of the mo..