Building secure software: how to avoid security problems the right way
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Addison-Wesley
2006
|
Ausgabe: | 8. print. |
Schriftenreihe: | Addison-Wesley professional computing series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXX, 493 S. |
ISBN: | 020172152X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022253429 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 070201s2006 |||| 00||| eng d | ||
020 | |a 020172152X |9 0-201-72152-X | ||
035 | |a (OCoLC)315958246 | ||
035 | |a (DE-599)BVBBV022253429 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-92 | ||
082 | 0 | |a 005.1 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Viega, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building secure software |b how to avoid security problems the right way |c John Viega ; Gary McGraw |
250 | |a 8. print. | ||
264 | 1 | |a Boston [u.a.] |b Addison-Wesley |c 2006 | |
300 | |a XXX, 493 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Addison-Wesley professional computing series | |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 1 | 1 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 2 | 1 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a MacGraw, Gary |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015464188&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015464188 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136250480787456 |
---|---|
adam_text | xii
Authentication
Integrity
Know Your Enemy: Common Software Security Pitfalls
Software Project Goals
Conclusion
2
An Overview of Software Risk Management for Security
The Role of Security Personnel
Software Security Personnel in the Life Cycle
Deriving Requirements
Risk Assessment
Design for Security
Implementation
Security Testing
A Dose of Reality
Getting People to Think about Security
Software Risk Management in Practice
When Development Goes Astray
When Security Analysis Goes Astray
The Common Criteria
Conclusion
3
Choosing a Language
Choosing a Distributed Object Platform
CORBA
DCOM
EJB and RMI
Choosing an Operating System
Authentication Technologies
Host-Based Authentication
Physical Tokens
Biometrie
Cryptographic Authentication
Defense in Depth and Authentication
Conclusion
Contents
Preface
Organization
Code Examples
Contacting Us
Acknowledgments
1
It s All about the Software
Dealing with Widespread Security Failures
Bugtraq
CERT Advisories
RISKS Digest
Technical Trends Affecting Software Security
The ilities
What Is Security?
Isn t That Just Reliability
Penetrate and Patch Is Bad
On Art and Engineering
Security Goals
Prevention
Traceability and Auditing
Monitoring
Privacy and Confidentiality
Multilevel Security
Anonymity
xi
Contents
4
Security by Obscurity
Reverse Engineering
Code Obfuscation
Security for
Security by Obscurity Is No Panacea
The Flip Side: Open-Source
Is the Many-Eyeballs Phenomenon Real?
Why Vulnerability Detection Is Hard
Other Worries
On Publishing Cryptographic Algorithms
Two More Open-Source Fallacies
The Microsoft Fallacy
The Java Fallacy
An Example: GNU Mailman Security
More Evidence: Trojan Horses
To Open Source or Not to Open Source
Another Security Lesson from Buffer Overflows
Beating the Drum
Conclusion
5
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Conclusion
6
Architectural Security Analysis
Attack Trees
Reporting Analysis Findings
xiv
Implementation
Auditing Source Code
Source-level Security Auditing Tools
Using RATS in an Analysis
The Effectiveness of Security Scanning of Software
Conclusion
7
What Is a Buffer Overflow?
Why Are Buffer Overflows a Security Problem?
Defending against Buffer Overflow
Major Gotchas
Internal Buffer Overflows
More Input Overflows
Other Risks
Tools That Can Help
Smashing Heaps and Stacks
Heap Overflows
Stack Overflows
Decoding the Stack
To Infinity
AttackCode
A UNIX Exploit
What About Windows
Conclusion
8
The UNIX Access Control Model
How UNIX Permissions Work
Modifying File Attributes
Modifying Ownership
The
The Programmatic Interface
Setuid Programming
Access Control in Windows NT
Compartmentalization
Fine-Grained Privileges
Conclusion
Contents
9
What Is a Race Condition?
Time-of-Check, Time-of-Use
Broken pas swd
Avoiding TOCTOU Problems
Secure File Access
Temporary Files
File Locking
Other Race Conditions
Conclusion
10
Pseudo-random Number Generators
Examples of PRNGs
The Blum-Blum-Shub PRNG
The Tiny PRNG
Attacks Against PRNGs
How to Cheat in On-line Gambling
Statistical Tests on PRNGs
Entropy Gathering and Estimation
Hardware Solutions
Software Solutions
Poor Entropy Collection:
How to Read Secret Netscape Messages
Handling Entropy
Practical Sources of Randomness
Tiny
Random Numbers for Windows
Random Numbers for Linux
Random Numbers in Java
Conclusion
11
General Recommendations
Developers Are Not Cryptographers
Data Integrity
Exp ort
xvi
Common Cryptographic Libraries
Cryptlib
OpenSSL
Crypto**
BSAFE
Cryptix
Programming with Cryptography
Encryption
Hashing
Public Key Encryption
Threading
Cookie Encryption
More Uses for Cryptographic Hashes
SSL and TLS (Transport Layer Security)
Stunnel
One-Time Pads
Conclusion
12
A Few Words on Trust
Examples of Misplaced Trust
Trust Is Transitive
Protection from Hostile Callers
Invoking Other Programs Safely
Problems from the Web
Client-side Security
Perl Problems
Format String Attacks
Automatically Detecting Input Problems
Conclusion
13
Password Storage
Adding Users to a Password Database
Password Authentication
Password Selection
More Advice
Throwing Dice
Contents
Passphrases
Application-Selected Passwords
One-Time Passwords
Conclusion
14
The Basics
Access Control
Using Views for Access Control
Field Protection
Security against Statistical Attacks
Conclusion
15
Copy Protection Schemes
License Files
Thwarting the Casual Pirate
O th
Other Copy Protection Schemes
Authenticating Untrusted Clients
Tamperproofing
Antidebugger Measures
Checksums
Responding to Misuse
Decoys
Code Obfuscation
Basic Obfuscation Techniques
Encrypting Program Parts
Conclusion
16
Basic Strategies
Client Proxies
Server Proxies
SOCKS
Peer to Peer
Conclusions
xviii
Appendix A Cryptography Basics
The Ultimate Goals of Cryptography
,
Types of Cryptography
Symmetric Cryptography
Types of Symmetric Algorithms
Security of Symmetric Algorithms
Public Key Cryptography
Cryptographic Hashing Algorithms
Other Attacks on Cryptographic Hashes
What s a Good Hash Algorithm to
Digital Signatures
Conclusions
References
Index
|
adam_txt |
xii
Authentication
Integrity
Know Your Enemy: Common Software Security Pitfalls
Software Project Goals
Conclusion
2
An Overview of Software Risk Management for Security
The Role of Security Personnel
Software Security Personnel in the Life Cycle
Deriving Requirements
Risk Assessment
Design for Security
Implementation
Security Testing
A Dose of Reality
Getting People to Think about Security
Software Risk Management in Practice
When Development Goes Astray
When Security Analysis Goes Astray
The Common Criteria
Conclusion
3
Choosing a Language
Choosing a Distributed Object Platform
CORBA
DCOM
EJB and RMI
Choosing an Operating System
Authentication Technologies
Host-Based Authentication
Physical Tokens
Biometrie
Cryptographic Authentication
Defense in Depth and Authentication
Conclusion
Contents
Preface
Organization
Code Examples
Contacting Us
Acknowledgments
1
It's All about the Software
Dealing with Widespread Security Failures
Bugtraq
CERT Advisories
RISKS Digest
Technical Trends Affecting Software Security
The 'ilities
What Is Security?
Isn't That Just Reliability
Penetrate and Patch Is Bad
On Art and Engineering
Security Goals
Prevention
Traceability and Auditing
Monitoring
Privacy and Confidentiality
Multilevel Security
Anonymity
xi
Contents
4
Security by Obscurity
Reverse Engineering
Code Obfuscation
Security for
Security by Obscurity Is No Panacea
The Flip Side: Open-Source
Is the "Many-Eyeballs Phenomenon" Real?
Why Vulnerability Detection Is Hard
Other Worries
On Publishing Cryptographic Algorithms
Two More Open-Source Fallacies
The Microsoft Fallacy
The Java Fallacy
An Example: GNU Mailman Security
More Evidence: Trojan Horses
To Open Source or Not to Open Source
Another Security Lesson from Buffer Overflows
Beating the Drum
Conclusion
5
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Principle
Conclusion
6
Architectural Security Analysis
Attack Trees
Reporting Analysis Findings
xiv
Implementation
Auditing Source Code
Source-level Security Auditing Tools
Using RATS in an Analysis
The Effectiveness of Security Scanning of Software
Conclusion
7
What Is a Buffer Overflow?
Why Are Buffer Overflows a Security Problem?
Defending against Buffer Overflow
Major Gotchas
Internal Buffer Overflows
More Input Overflows
Other Risks
Tools That Can Help
Smashing Heaps and Stacks
Heap Overflows
Stack Overflows
Decoding the Stack
To Infinity
AttackCode
A UNIX Exploit
What About Windows
Conclusion
8
The UNIX Access Control Model
How UNIX Permissions Work
Modifying File Attributes
Modifying Ownership
The
The Programmatic Interface
Setuid Programming
Access Control in Windows NT
Compartmentalization
Fine-Grained Privileges
Conclusion
Contents
9
What Is a Race Condition?
Time-of-Check, Time-of-Use
Broken pas swd
Avoiding TOCTOU Problems
Secure File Access
Temporary Files
File Locking
Other Race Conditions
Conclusion
10
Pseudo-random Number Generators
Examples of PRNGs
The Blum-Blum-Shub PRNG
The Tiny PRNG
Attacks Against PRNGs
How to Cheat in On-line Gambling
Statistical Tests on PRNGs
Entropy Gathering and Estimation
Hardware Solutions
Software Solutions
Poor Entropy Collection:
How to Read "Secret" Netscape Messages
Handling Entropy
Practical Sources of Randomness
Tiny
Random Numbers for Windows
Random Numbers for Linux
Random Numbers in Java
Conclusion
11
General Recommendations
Developers Are Not Cryptographers
Data Integrity
Exp ort
xvi
Common Cryptographic Libraries
Cryptlib
OpenSSL
Crypto**
BSAFE
Cryptix
Programming with Cryptography
Encryption
Hashing
Public Key Encryption
Threading
Cookie Encryption
More Uses for Cryptographic Hashes
SSL and TLS (Transport Layer Security)
Stunnel
One-Time Pads
Conclusion
12
A Few Words on Trust
Examples of Misplaced Trust
Trust Is Transitive
Protection from Hostile Callers
Invoking Other Programs Safely
Problems from the Web
Client-side Security
Perl Problems
Format String Attacks
Automatically Detecting Input Problems
Conclusion
13
Password Storage
Adding Users to a Password Database
Password Authentication
Password Selection
More Advice
Throwing Dice
Contents
Passphrases
Application-Selected Passwords
One-Time Passwords
Conclusion
14
The Basics
Access Control
Using Views for Access Control
Field Protection
Security against Statistical Attacks
Conclusion
15
Copy Protection Schemes
License Files
Thwarting the Casual Pirate
O th
Other Copy Protection Schemes
Authenticating Untrusted Clients
Tamperproofing
Antidebugger Measures
Checksums
Responding to Misuse
Decoys
Code Obfuscation
Basic Obfuscation Techniques
Encrypting Program Parts
Conclusion
16
Basic Strategies
Client Proxies
Server Proxies
SOCKS
Peer to Peer
Conclusions
xviii
Appendix A Cryptography Basics
The Ultimate Goals of Cryptography
,
Types of Cryptography
Symmetric Cryptography
Types of Symmetric Algorithms
Security of Symmetric Algorithms
Public Key Cryptography
Cryptographic Hashing Algorithms
Other Attacks on Cryptographic Hashes
What's a Good Hash Algorithm to
Digital Signatures
Conclusions
References
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Viega, John |
author_facet | Viega, John |
author_role | aut |
author_sort | Viega, John |
author_variant | j v jv |
building | Verbundindex |
bvnumber | BV022253429 |
classification_rvk | ST 276 |
classification_tum | DAT 050f DAT 460f |
ctrlnum | (OCoLC)315958246 (DE-599)BVBBV022253429 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 8. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02188nam a2200541 c 4500</leader><controlfield tag="001">BV022253429</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070201s2006 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">020172152X</subfield><subfield code="9">0-201-72152-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)315958246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022253429</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Viega, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building secure software</subfield><subfield code="b">how to avoid security problems the right way</subfield><subfield code="c">John Viega ; Gary McGraw</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">8. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 493 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Addison-Wesley professional computing series</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">MacGraw, Gary</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015464188&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015464188</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022253429 |
illustrated | Not Illustrated |
index_date | 2024-07-02T16:40:15Z |
indexdate | 2024-07-09T20:53:25Z |
institution | BVB |
isbn | 020172152X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015464188 |
oclc_num | 315958246 |
open_access_boolean | |
owner | DE-739 DE-92 |
owner_facet | DE-739 DE-92 |
physical | XXX, 493 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Addison-Wesley |
record_format | marc |
series2 | Addison-Wesley professional computing series |
spelling | Viega, John Verfasser aut Building secure software how to avoid security problems the right way John Viega ; Gary McGraw 8. print. Boston [u.a.] Addison-Wesley 2006 XXX, 493 S. txt rdacontent n rdamedia nc rdacarrier Addison-Wesley professional computing series Software Engineering (DE-588)4116521-4 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Softwareschutz (DE-588)4131649-6 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 s Computersicherheit (DE-588)4274324-2 s DE-604 Software Engineering (DE-588)4116521-4 s Softwareschutz (DE-588)4131649-6 s 1\p DE-604 Softwareentwicklung (DE-588)4116522-6 s 2\p DE-604 MacGraw, Gary Sonstige oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015464188&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Viega, John Building secure software how to avoid security problems the right way Software Engineering (DE-588)4116521-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd Softwareentwicklung (DE-588)4116522-6 gnd Softwareschutz (DE-588)4131649-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4116521-4 (DE-588)4011152-0 (DE-588)4116522-6 (DE-588)4131649-6 (DE-588)4274324-2 |
title | Building secure software how to avoid security problems the right way |
title_auth | Building secure software how to avoid security problems the right way |
title_exact_search | Building secure software how to avoid security problems the right way |
title_exact_search_txtP | Building secure software how to avoid security problems the right way |
title_full | Building secure software how to avoid security problems the right way John Viega ; Gary McGraw |
title_fullStr | Building secure software how to avoid security problems the right way John Viega ; Gary McGraw |
title_full_unstemmed | Building secure software how to avoid security problems the right way John Viega ; Gary McGraw |
title_short | Building secure software |
title_sort | building secure software how to avoid security problems the right way |
title_sub | how to avoid security problems the right way |
topic | Software Engineering (DE-588)4116521-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd Softwareentwicklung (DE-588)4116522-6 gnd Softwareschutz (DE-588)4131649-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Software Engineering Datenverarbeitung Softwareentwicklung Softwareschutz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015464188&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT viegajohn buildingsecuresoftwarehowtoavoidsecurityproblemstherightway AT macgrawgary buildingsecuresoftwarehowtoavoidsecurityproblemstherightway |