{"product_id":"24-deadly-sins-of-software-security-programming-flaws-and-how-to-fix-them-paperback","title":"24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them - Paperback","description":"\u003cdiv\u003e\u003cp style=\"text-align: right;\"\u003e\u003ca href=\"https:\/\/reportcopyrightinfringement.com\/\" target=\"_blank\" rel=\"nofollow\"\u003e\u003cb\u003eReport copyright infringement\u003c\/b\u003e\u003c\/a\u003e\u003c\/p\u003e\u003c\/div\u003e\u003cp\u003eby \u003cb\u003eMichael Howard\u003c\/b\u003e (Author), \u003cb\u003eDavid LeBlanc\u003c\/b\u003e (Author), \u003cb\u003eJohn Viega\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003e\u003cb\u003ePublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.\u003c\/b\u003e\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003e\u003cbr\u003e\u003c\/strong\u003e\u003c\/p\u003e\u003cp\u003e\u003cstrong\u003eEradicate the Most Notorious Insecure Designs and Coding Vulnerabilities\u003c\/strong\u003e\u003c\/p\u003e\u003cp\u003eFully updated to cover the latest security issues, \u003cem\u003e24 Deadly Sins of Software Security\u003c\/em\u003e reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: \u003c\/p\u003e\u003cul\u003e\n\u003cli\u003eSQL injection \u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWeb server- and client-related vulnerabilities\u003c\/li\u003e\n\u003cli\u003eUse of magic URLs, predictable cookies, and hidden form fields\u003c\/li\u003e\n\u003cli\u003eBuffer overruns\u003c\/li\u003e\n\u003cli\u003eFormat string problems\u003c\/li\u003e\n\u003cli\u003eInteger overflows\u003c\/li\u003e\n\u003cli\u003eC++ catastrophes\u003c\/li\u003e\n\u003cli\u003eInsecure exception handling\u003c\/li\u003e\n\u003cli\u003eCommand injection\u003c\/li\u003e\n\u003cli\u003eFailure to handle errors\u003c\/li\u003e\n\u003cli\u003eInformation leakage\u003c\/li\u003e\n\u003cli\u003eRace conditions\u003c\/li\u003e\n\u003cli\u003ePoor usability\u003c\/li\u003e\n\u003cli\u003eNot updating easily\u003c\/li\u003e\n\u003cli\u003eExecuting code with too much privilege\u003c\/li\u003e\n\u003cli\u003eFailure to protect stored data\u003c\/li\u003e\n\u003cli\u003eInsecure mobile code\u003c\/li\u003e\n\u003cli\u003eUse of weak password-based systems\u003c\/li\u003e\n\u003cli\u003eWeak random numbers\u003c\/li\u003e\n\u003cli\u003eUsing cryptography incorrectly\u003c\/li\u003e\n\u003cli\u003eFailing to protect network traffic\u003c\/li\u003e\n\u003cli\u003eImproper use of PKI\u003c\/li\u003e\n\u003cli\u003eTrusting network name resolution\u003c\/li\u003e\n\u003c\/ul\u003e\u003ch3\u003eAuthor Biography\u003c\/h3\u003e\u003cp\u003e\u003cstrong\u003eMichael Howard\u003c\/strong\u003e is is a principal security program manager on the Trustworthy Computing Group's Security Engineering team at Microsoft. He is the author or coauthor of many well-known software security books and is an editor of \u003ci\u003eIEEE Security \u0026amp; Privacy\u003c\/i\u003e.\u003c\/p\u003e\u003cstrong\u003eDavid LeBlanc, Ph.D., \u003c\/strong\u003e is a principal software development engineer on the Microsoft Office security team. He is a coauthor, with Michael Howard, of \u003ci\u003eWriting Secure Code\u003c\/i\u003e (Microsoft Press).\u003cstrong\u003eJohn Viega\u003c\/strong\u003e is CTO of the SaaS Business Unit at McAfee and was previously their chief security architect. He is the author of five other security books. Mr. Viega first defined the 19 deadly sins of software security for the Department of Homeland Security.\n            \u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 432\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.9 x 9.3 x 7.5 IN\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eIllustrated:\u003c\/strong\u003e Yes\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e September 24, 2009\u003c\/div\u003e\n            ","brand":"BooksCloud","offers":[{"title":"Default Title","offer_id":52489889448243,"sku":"9780071626750","price":75.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0300\/5595\/6612\/files\/Qlo3d1E0WXZ4UzdYajNYYkJwZEpLdz09.webp?v=1759917256","url":"https:\/\/www.vysn.com\/products\/24-deadly-sins-of-software-security-programming-flaws-and-how-to-fix-them-paperback","provider":"VYSN","version":"1.0","type":"link"}