Programmer's ultimate security deskref:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2004
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from e-book title screen (viewed Oct. 26, 2004) Includes bibliographical references Java Ref; C Ref; C++ Ref; Visual Basic Ref; Perl Ref; PHP Ref; Python Ref; SQL Ref; C♯ Ref; JavaScript Ref; SAS Ref; Lisp Ref; IDL Ref The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C♯, and Visual Basic. * Defines the programming flaws within the top 15 programming languages. * Comprehensive approach means you only need this book to ensure an application's overall security. * One book geared toward many languages |
Beschreibung: | 1 Online-Ressource |
ISBN: | 0080480454 1281056308 1597490075 1932266720 9780080480459 9781281056306 9781597490078 9781932266726 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043104659 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080480454 |9 0-08-048045-4 | ||
020 | |a 1281056308 |9 1-281-05630-8 | ||
020 | |a 1597490075 |c electronic bk. |9 1-59749-007-5 | ||
020 | |a 1932266720 |9 1-932266-72-0 | ||
020 | |a 9780080480459 |9 978-0-08-048045-9 | ||
020 | |a 9781281056306 |9 978-1-281-05630-6 | ||
020 | |a 9781597490078 |c electronic bk. |9 978-1-59749-007-8 | ||
020 | |a 9781932266726 |9 978-1-932266-72-6 | ||
035 | |a (OCoLC)56823613 | ||
035 | |a (DE-599)BVBBV043104659 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Foster, James C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Programmer's ultimate security deskref |c James C. Foster, Stephen C. Foster |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2004 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from e-book title screen (viewed Oct. 26, 2004) | ||
500 | |a Includes bibliographical references | ||
500 | |a Java Ref; C Ref; C++ Ref; Visual Basic Ref; Perl Ref; PHP Ref; Python Ref; SQL Ref; C♯ Ref; JavaScript Ref; SAS Ref; Lisp Ref; IDL Ref | ||
500 | |a The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C♯, and Visual Basic. * Defines the programming flaws within the top 15 programming languages. * Comprehensive approach means you only need this book to ensure an application's overall security. * One book geared toward many languages | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
700 | 1 | |a Foster, Stephen C. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028528850 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175518152523776 |
---|---|
any_adam_object | |
author | Foster, James C. |
author_facet | Foster, James C. |
author_role | aut |
author_sort | Foster, James C. |
author_variant | j c f jc jcf |
building | Verbundindex |
bvnumber | BV043104659 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)56823613 (DE-599)BVBBV043104659 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03117nmm a2200517zc 4500</leader><controlfield tag="001">BV043104659</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480454</subfield><subfield code="9">0-08-048045-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281056308</subfield><subfield code="9">1-281-05630-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490075</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-007-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266720</subfield><subfield code="9">1-932266-72-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480459</subfield><subfield code="9">978-0-08-048045-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281056306</subfield><subfield code="9">978-1-281-05630-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490078</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-007-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266726</subfield><subfield code="9">978-1-932266-72-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56823613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043104659</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Programmer's ultimate security deskref</subfield><subfield code="c">James C. Foster, Stephen C. Foster</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed Oct. 26, 2004)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Java Ref; C Ref; C++ Ref; Visual Basic Ref; Perl Ref; PHP Ref; Python Ref; SQL Ref; C♯ Ref; JavaScript Ref; SAS Ref; Lisp Ref; IDL Ref</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C♯, and Visual Basic. * Defines the programming flaws within the top 15 programming languages. * Comprehensive approach means you only need this book to ensure an application's overall security. * One book geared toward many languages</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foster, Stephen C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028528850</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043104659 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:33Z |
institution | BVB |
isbn | 0080480454 1281056308 1597490075 1932266720 9780080480459 9781281056306 9781597490078 9781932266726 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028528850 |
oclc_num | 56823613 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Foster, James C. Verfasser aut Programmer's ultimate security deskref James C. Foster, Stephen C. Foster Rockland, MA Syngress Pub. ©2004 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Title from e-book title screen (viewed Oct. 26, 2004) Includes bibliographical references Java Ref; C Ref; C++ Ref; Visual Basic Ref; Perl Ref; PHP Ref; Python Ref; SQL Ref; C♯ Ref; JavaScript Ref; SAS Ref; Lisp Ref; IDL Ref The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C♯, and Visual Basic. * Defines the programming flaws within the top 15 programming languages. * Comprehensive approach means you only need this book to ensure an application's overall security. * One book geared toward many languages COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc Foster, Stephen C. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162 Aggregator Volltext |
spellingShingle | Foster, James C. Programmer's ultimate security deskref COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc |
title | Programmer's ultimate security deskref |
title_auth | Programmer's ultimate security deskref |
title_exact_search | Programmer's ultimate security deskref |
title_full | Programmer's ultimate security deskref James C. Foster, Stephen C. Foster |
title_fullStr | Programmer's ultimate security deskref James C. Foster, Stephen C. Foster |
title_full_unstemmed | Programmer's ultimate security deskref James C. Foster, Stephen C. Foster |
title_short | Programmer's ultimate security deskref |
title_sort | programmer s ultimate security deskref |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Handbooks, manuals, etc |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Computer security Handbooks, manuals, etc |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=121162 |
work_keys_str_mv | AT fosterjamesc programmersultimatesecuritydeskref AT fosterstephenc programmersultimatesecuritydeskref |