24 deadly sins of software security: programming flaws and how to fix them
A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography.
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
McGraw-Hill
2010
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780071626750/?ar |
Zusammenfassung: | A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxxvii, 393 Seiten) illustrations |
ISBN: | 9780071626767 007162676X 9780071759847 0071759840 9787162600750 7162600751 9781282311718 1282311719 9786612311710 6612311711 9780071626750 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047389273 | ||
003 | DE-627-1 | ||
005 | 20240228114445.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2010 xx |||||o 00| ||eng c | ||
020 | |a 9780071626767 |c electronic bk. |9 978-0-07-162676-7 | ||
020 | |a 007162676X |c electronic bk. |9 0-07-162676-X | ||
020 | |a 9780071759847 |c electronic bk. |9 978-0-07-175984-7 | ||
020 | |a 0071759840 |c electronic bk. |9 0-07-175984-0 | ||
020 | |a 9787162600750 |9 978-7-162-60075-0 | ||
020 | |a 7162600751 |9 7-162-60075-1 | ||
020 | |a 9781282311718 |9 978-1-282-31171-8 | ||
020 | |a 1282311719 |9 1-282-31171-9 | ||
020 | |a 9786612311710 |9 9786612311710 | ||
020 | |a 6612311711 |9 6612311711 | ||
020 | |a 9780071626750 |9 978-0-07-162675-0 | ||
035 | |a (DE-627-1)047389273 | ||
035 | |a (DE-599)KEP047389273 | ||
035 | |a (ORHE)9780071626750 | ||
035 | |a (DE-627-1)047389273 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UB |2 bicssc | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Howard, Michael |d 1965- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a 24 deadly sins of software security |b programming flaws and how to fix them |c Michael Howard, David LeBlanc, and John Viega |
264 | 1 | |a New York |b McGraw-Hill |c 2010 | |
300 | |a 1 Online-Ressource (xxxvii, 393 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography. | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer programming / software engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Network security | |
650 | 4 | |a Stationery items | |
650 | 4 | |a Computers and IT | |
700 | 1 | |a LeBlanc, David |d 1960- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Viega, John |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780071626750 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780071626750 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780071626750/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047389273 |
---|---|
_version_ | 1821494913024393216 |
adam_text | |
any_adam_object | |
author | Howard, Michael 1965- |
author2 | LeBlanc, David 1960- Viega, John |
author2_role | ctb ctb |
author2_variant | d l dl j v jv |
author_facet | Howard, Michael 1965- LeBlanc, David 1960- Viega, John |
author_role | aut |
author_sort | Howard, Michael 1965- |
author_variant | m h mh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047389273 (DE-599)KEP047389273 (ORHE)9780071626750 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02876cam a22007452 4500</leader><controlfield tag="001">ZDB-30-ORH-047389273</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114445.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071626767</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-07-162676-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">007162676X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-07-162676-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071759847</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-07-175984-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071759840</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-07-175984-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9787162600750</subfield><subfield code="9">978-7-162-60075-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">7162600751</subfield><subfield code="9">7-162-60075-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282311718</subfield><subfield code="9">978-1-282-31171-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282311719</subfield><subfield code="9">1-282-31171-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612311710</subfield><subfield code="9">9786612311710</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6612311711</subfield><subfield code="9">6612311711</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071626750</subfield><subfield code="9">978-0-07-162675-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047389273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047389273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780071626750</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047389273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UB</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Howard, Michael</subfield><subfield code="d">1965-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">24 deadly sins of software security</subfield><subfield code="b">programming flaws and how to fix them</subfield><subfield code="c">Michael Howard, David LeBlanc, and John Viega</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvii, 393 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming / software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Stationery items</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and IT</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">LeBlanc, David</subfield><subfield code="d">1960-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Viega, John</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780071626750</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780071626750</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780071626750/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047389273 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:55Z |
institution | BVB |
isbn | 9780071626767 007162676X 9780071759847 0071759840 9787162600750 7162600751 9781282311718 1282311719 9786612311710 6612311711 9780071626750 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxxvii, 393 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Howard, Michael 1965- VerfasserIn aut 24 deadly sins of software security programming flaws and how to fix them Michael Howard, David LeBlanc, and John Viega New York McGraw-Hill 2010 1 Online-Ressource (xxxvii, 393 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record A guide to computer software security covers such topics as Web server vulnerabilities, buffer overruns, format string problems, integer overflows, poor usability, and cryptography. English. Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer programming / software engineering Network security Stationery items Computers and IT LeBlanc, David 1960- MitwirkendeR ctb Viega, John MitwirkendeR ctb 9780071626750 Erscheint auch als Druck-Ausgabe 9780071626750 |
spellingShingle | Howard, Michael 1965- 24 deadly sins of software security programming flaws and how to fix them Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer programming / software engineering Network security Stationery items Computers and IT |
title | 24 deadly sins of software security programming flaws and how to fix them |
title_auth | 24 deadly sins of software security programming flaws and how to fix them |
title_exact_search | 24 deadly sins of software security programming flaws and how to fix them |
title_full | 24 deadly sins of software security programming flaws and how to fix them Michael Howard, David LeBlanc, and John Viega |
title_fullStr | 24 deadly sins of software security programming flaws and how to fix them Michael Howard, David LeBlanc, and John Viega |
title_full_unstemmed | 24 deadly sins of software security programming flaws and how to fix them Michael Howard, David LeBlanc, and John Viega |
title_short | 24 deadly sins of software security |
title_sort | 24 deadly sins of software security programming flaws and how to fix them |
title_sub | programming flaws and how to fix them |
topic | Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer programming / software engineering Network security Stationery items Computers and IT |
topic_facet | Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer programming / software engineering Network security Stationery items Computers and IT |
work_keys_str_mv | AT howardmichael 24deadlysinsofsoftwaresecurityprogrammingflawsandhowtofixthem AT leblancdavid 24deadlysinsofsoftwaresecurityprogrammingflawsandhowtofixthem AT viegajohn 24deadlysinsofsoftwaresecurityprogrammingflawsandhowtofixthem |