Foundations of security : what every programmer needs to know / Neil Daswani, Christoph Kern, and Anita Kesavan
Tipo de material:![Texto](/opac-tmpl/lib/famfamfam/BK.png)
Contenidos:
Contenido: Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3
Tipo de ítem | Biblioteca actual | Colección | Clasificación | Copia número | Estado | Fecha de vencimiento | Código de barras | Reserva de ítems |
---|---|---|---|---|---|---|---|---|
![]() |
Libros Libros | General | QA76.76P76 D37 (Navegar estantería(Abre debajo)) | 1 | Disponible | 9843 |
Total de reservas: 0
Navegando Libros Estantes, Ubicación: Libros, Código de colección: General Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.76O63 X45 Xenix guia practica | QA76.76O634 N48 Learning the bash shell | QA76.76O635 W4518 Guia de referencia y aprendizaje Linux / | QA76.76P76 D37 Foundations of security : | QA76.76P76 P76 1992 The protection of computer software-its technology and applications | QA76.76Q35 J45 Software quality management and ISO 9001 : | QA76.76Q35 S675 Software quality : |
Contenido: Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3
compra 2013/06/06 446.00
No hay comentarios en este titulo.