0

My Bag

0.00

Download App

Foundations of Security: What Every Programmer Needs to Know 10.0%OFF

Foundations of Security: What Every Programmer Needs to Know

by Christoph Kern, Anita Kesavan and Neil Daswani

  • ISBN

    :  

    9788181286420

  • Publisher

    :  

    Dreamtech Press

  • Subject

    :  

    Computer Security

  • Binding

    :  

    Paperback

  • Pages

    :  

    320

  • Year

    :  

    2007

349.0

10.0% OFF

314.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    What every programmer needs to know about security, illustrated with running examples of web applications and stories of what's gone wrong in the past. This book takes a principles approach to helping you design and implement your applications to be secure from the ground-up and illustrates these principles using running examples of web applications throughout the book. This book does not just focus on merely teaching you tips and tricks that allow you to band aid the security of your systems. Instead, it illustrates how security principles can be employed to prevent some of the most significant, current-day attack types, such as cross-site scripting (XSS) and SQL injection as well as more traditional attack types such as buffer overflows. About The Author Neil Daswani has served in a variety of research, development, teaching and managerial roles at Google, NTT DoCoMo USA Labs, Stanford University, Yodlee and Telcordia Technologies (formely Bellcore). While at Stanford, Neil confounded the Stanford Center Professional Development (SCPD) security Certification program. His areas of expertise include security, peer-to-peer systems and wireless data technology. He has published extensively in these areas; he frequently gives talks at industry and academic conferences and has been granted several US patents. He received PhD in computer Science from Stanford University. He also holds an MS in Computer Science from Stanford University and a BS in Computer Science with Honors with distinction from Columbia University. Cristoph Kern is an Information security engineer at Google, and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications and helping product managers and software engineers effectively mitigate security risks in their software products. Anita Keswani is a freelance writer and received MFA in creative writing from sarah Lawrence College. She also holds a BA in English from Illinois-Wesleyan University. One of her specializations is communicating complex technical ideas in simple, easy-to-understand language. Table Of Contents Part I Security Design Principles Security Goals Secure Systems Design Secure Design Principles Exercises for Part 1 Part II Secure Programming Techniques Worms and Other Malware Buffer Overflows Client-State Manipulation SQL Injection Password Security Cross-Domain Security in Web Applications Exercises for Part 2 Part III Introduction to Cryptography Symmetric Key Cryptography Asymmetric Key Cryptography Key Management and Exchange MACs and Signatures Exercises for Part 3

Related Items

-

of

  • OFFER

    Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of ... Computer Science / Security and Cryptology)

    Pierpaolo Degano

    Starts At

    8107.0

    8445.0

    4% OFF

  • OFFER

    Foundations of Security Analysis and Design V: FOSAD 2008/2009 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology)

    Alessandro Aldini

    Starts At

    4268.0

    4691.0

    9% OFF

  • OFFER

    Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

    Ahmad-Reza Sadeghi

    Starts At

    18014.0

    18765.0

    4% OFF

  • OFFER

    Introduction to Cryptography with Mathematical Foundations and Computer Implementations

    Alexander Stanoyevitch

    Starts At

    8694.0

    9554.0

    9% OFF

  • OFFER

    Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures

    Aldini Alessandro

    Starts At

    4912.0

    5117.0

    4% OFF

  • Securing Business Information: Strategies to Protect the Enterprise and Its Network

    Chrisitan F. Byrnes

    Starts At

    1105.0

  • OFFER

    Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms

    Wil Mccarthy

    Starts At

    376.0

    495.0

    24% OFF

  • OFFER

    Worm: The First Digital World War

    Mark Bowden

    Starts At

    412.0

    550.0

    25% OFF

  • OFFER

    Control and Security of E-Commerce

    Gordon Edward Smith

    Starts At

    9646.0

    11217.0

    14% OFF

  • Access Control, Authentication, and Public Key Infrastructure (Information Systems Security & Assurance)

    Bill Ballad

    Starts At

    5799.0

  • OFFER

    Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

    Sean-Philip Oriyano

    Starts At

    8880.0

    11685.0

    24% OFF

  • OFFER

    Internet Security: Hacking, Counterhacking, and Security

    Kenneth Einar Himma

    Starts At

    2625.0

    3241.0

    19% OFF

  • Security Policies and Implementation Issues (Information Systems Security & Assurance)

    Robert Johnson

    Starts At

    5799.0

  • OFFER

    Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy

    Committee on Deterring Cyberattacks: Informing Strategies and Developing Options

    Starts At

    3678.0

    5039.7

    27% OFF

  • OFFER

    Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures

    National Research Council

    Starts At

    1868.0

    2559.0

    27% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary