
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Security | >> | Foundations Of Secur... |
ISBN
:
9788181286420
Publisher
:
Dreamtech Press
Subject
:
Computer Security
Binding
:
Paperback
Pages
:
320
Year
:
2007
₹
349.0
₹
314.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
What every programmer needs to know about security, illustrated with running examples of web applications and stories of what's gone wrong in the past. This book takes a principles approach to helping you design and implement your applications to be secure from the ground-up and illustrates these principles using running examples of web applications throughout the book. This book does not just focus on merely teaching you tips and tricks that allow you to band aid the security of your systems. Instead, it illustrates how security principles can be employed to prevent some of the most significant, current-day attack types, such as cross-site scripting (XSS) and SQL injection as well as more traditional attack types such as buffer overflows. About The Author Neil Daswani has served in a variety of research, development, teaching and managerial roles at Google, NTT DoCoMo USA Labs, Stanford University, Yodlee and Telcordia Technologies (formely Bellcore). While at Stanford, Neil confounded the Stanford Center Professional Development (SCPD) security Certification program. His areas of expertise include security, peer-to-peer systems and wireless data technology. He has published extensively in these areas; he frequently gives talks at industry and academic conferences and has been granted several US patents. He received PhD in computer Science from Stanford University. He also holds an MS in Computer Science from Stanford University and a BS in Computer Science with Honors with distinction from Columbia University. Cristoph Kern is an Information security engineer at Google, and was previously a senior security architect at Yodlee, a provider of technology solutions to the financial services industry. He has extensive experience in performing security design reviews and code audits, designing and developing secure applications and helping product managers and software engineers effectively mitigate security risks in their software products. Anita Keswani is a freelance writer and received MFA in creative writing from sarah Lawrence College. She also holds a BA in English from Illinois-Wesleyan University. One of her specializations is communicating complex technical ideas in simple, easy-to-understand language. Table Of Contents Part I Security Design Principles Security Goals Secure Systems Design Secure Design Principles Exercises for Part 1 Part II Secure Programming Techniques Worms and Other Malware Buffer Overflows Client-State Manipulation SQL Injection Password Security Cross-Domain Security in Web Applications Exercises for Part 2 Part III Introduction to Cryptography Symmetric Key Cryptography Asymmetric Key Cryptography Key Management and Exchange MACs and Signatures Exercises for Part 3
Related Items
-
of
Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of ... Computer Science / Security and Cryptology)
Pierpaolo Degano
Starts At
8107.0
8445.0
4% OFF
Foundations of Security Analysis and Design V: FOSAD 2008/2009 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology)
Alessandro Aldini
Starts At
4268.0
4691.0
9% OFF
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Ahmad-Reza Sadeghi
Starts At
18014.0
18765.0
4% OFF
Introduction to Cryptography with Mathematical Foundations and Computer Implementations
Alexander Stanoyevitch
Starts At
8694.0
9554.0
9% OFF
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures
Aldini Alessandro
Starts At
4912.0
5117.0
4% OFF
Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms
Wil Mccarthy
Starts At
376.0
495.0
24% OFF
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Sean-Philip Oriyano
Starts At
8880.0
11685.0
24% OFF
Internet Security: Hacking, Counterhacking, and Security
Kenneth Einar Himma
Starts At
2625.0
3241.0
19% OFF
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
Committee on Deterring Cyberattacks: Informing Strategies and Developing Options
Starts At
3678.0
5039.7
27% OFF
Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures
National Research Council
Starts At
1868.0
2559.0
27% OFF