标题(title):Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
用于C和C++的安全编程食谱:密码学、认证、输入验证和更多的配方
作者(author):Viega, John, Messier, Matt & Matt Messier
出版社(publisher):O'Reilly Media, Inc
大小(size):2 MB (1648205 bytes)
格式(extension):epub
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. Read more...
Abstract: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering
Table of contents :
Content: Secure Programming Cookbook for C and C++
Preface
We Can & t Do It All
Organization of This Book
Recipe Compatibility
Conventions Used in This Book
Comments and Questions
Acknowledgments
1. Safe Initialization
1.1.2. Solution
1.1.3. Discussion
1.1.4. See Also
1.2. Restricting Privileges on Windows
1.2.2. Solution
1.2.3. Discussion
1.2.3.2. Modifying a process & s primary token
1.2.3.3. Working with SID_AND_ATTRIBUTES structures
1.2.3.4. Working with LUID_AND_ATTRIBUTES structures
1.2.4. See Also
1.3. Dropping Privileges in setuid Programs
1.3.2. Solution
1.3.3. Discussion. 1.3.4. See Also1.4. Limiting Risk with Privilege Separation
1.4.2. Solution
1.4.3. Discussion
1.4.3.2. A privilege separation library: privman
1.4.4. See Also
1.5. Managing File Descriptors Safely
1.5.2. Solution
1.5.3. Discussion
1.6. Creating a Child Process Securely
1.6.2. Solution
1.6.3. Discussion
1.6.4. See Also
1.7. Executing External Programs Securely
1.7.2. Solution
1.7.3. Discussion
1.7.4. See Also
1.8. Execut.
想了解更多信息?可向上传者提问。点击提问