Commencez à lire Secure Programming Cookbook for C and C++ sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More [Format Kindle]

John Viega , Matt Messier
5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)

Prix conseillé : EUR 47,46 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 83,35
Prix Kindle : EUR 33,22 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 50,13 (60%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 33,22  
Broché EUR 61,23  

Descriptions du produit

Présentation de l'éditeur

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn:

  • How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems
  • How to properly SSL-enable applications
  • How to create secure channels for client-server communication without SSL
  • How to integrate Public Key Infrastructure (PKI) into applications
  • Best practices for using cryptography properly
  • Techniques and strategies for properly validating input to programs
  • How to launch programs securely
  • How to use file access mechanisms properly
  • Techniques for protecting applications from reverse engineering
The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers.

Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
3 étoiles
2 étoiles
1 étoiles
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
3 internautes sur 3 ont trouvé ce commentaire utile 
J'ai acheté ce livre car je voulais développer une application sécuritaire sous Linux. Je m'étais plutôt focalisé sur l'échange sûr des données avec un serveur web via SSL, et sur le stockage d'informations confidentielles sur un disque dur local.

Le résultat ? non seulement ce livre a répondu à mes attentes, mais aussi il est allé largement au-delà de tout ce que j'aurais pu espérer.

Si vous avez un état d'esprit curieux, et que vous avez une certaine passion pour la sécurité informatique, ce livre est vraiment fait pour vous.

Le livre n'est pas basé sur un OS précis, et il montre des exemples sous Unix et Windows (dans la mesure où ce dernier en est capable, car ce n'est pas toujours le cas).

Au début, il parle plutôt sur les erreurs qui peuvent faire que votre soft plante et qui peuvent permettre à un éventuel cracker à avoir plus de privilèges que ceux qu'il devrait en avoir. C'est donc très approprié notamment pour les développeurs de services s'interfaçant directement avec le monde internet.

Ensuite, il traite le sujet des PKIs, SSL, échange des informations de façon sure en générale, mais avec un niveau de détail qui répond à tous les besoins. Il montre les algos, les implémentations, et les librairies libres qui peuvent nous aider. De même, il montre des stratégies pour renforcer les algorithmes cryptographiques.
Lire la suite ›
Avez-vous trouvé ce commentaire utile ?
5.0 étoiles sur 5 Parfait 3 décembre 2014
Format:Broché|Achat vérifié
Non seulement ce livre a répondu à mes attentes, mais aussi il est allé largement au-delà de tout ce que j'aurais pu espérer.
Si vous êtes curieux, ce livre est vraiment fait pour vous.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur (beta) 4.2 étoiles sur 5  12 commentaires
16 internautes sur 17 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Bought it for one reason but ended up using it. 16 octobre 2003
Par "lucincia" - Publié sur
To be truthful, I bought this book because the "gang" I hang out with is mentioned in the Acknowledgments section of the book. That was the ONLY reason when I sent money to Amazon.Com and purchased it for the dusty collection on my bookshelf.
But, when I got it and chuckled over the Acknowledgements section, I started to mindlessly flip through the book. Mindless page flipping soon turned to semi-conscious scanning. Semi-conscious scanning soon turned to serious reading. I find myself reading the book more and more, jumping back and forth between sections I find interesting and useful.
As a Windows C++ programmer for in-house tools, I do not dwell much on secure programming concepts. Yes, this is very, very bad way to program, so those of you reading this review should not try it at home. This book has shown the errors of my ways, revealed security issues that I have overlooked by accident or on purpose and gave concepts and examples that I can apply in my projects.
This book is one reference that I will be going back over and over again. The authors and editors have done a wonderful job to make the reading flow nice and easy. It is also very well laid out by stating the problem you may encounter, followed by a solution and then detailed discussion section with code samples.
For any C/C++ programmer making software to be used by more than one person, this reference book is a must.
You can still read the Acknowledgments and marvel at my name on there, of course.
17 internautes sur 19 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Voluminous and comprehensive 17 août 2003
Par W Boudville - Publié sur
If you are interested in encryption, you should probably get Bruce Schneier's Applied Cryptography, which is generally considered the standard summary of the field. But suppose you actually want to use some of the symmetric key or public key methods he describes? If you want to code from scratch, his book is a good starting point. But if you want to quickly avail yourself of the best existing methods and you don't want to reinvent the wheel by recoding? Also, it can be risky to do that. A mistake made in coding a crypto algorithm might render it insecure. Better to use reviewed, tested code.
If this describes your needs and you code in C or C++, then this book will be invaluable. Extensive code fragments that show how you can interface to existing crypto packages. Very detailed. You won't find theorems or any elegant maths here. No Chinese Remainder Theorem or Fermat's theorems. You have to already know or accept the theoretical underpinnings.
Given this, the book takes you into the nitty gritty of every major publicly available cryptosystem. With up to date assessments of their comparative strengths.
All of the above is aimed at application developers. The book also has sections for sysadmins of both unix and Microsoft operating systems, replete with suggestions on patching and good practice.
Don't be daunted by the book's heft. It is encyclopaedic in scope, and access is reasonably random access. The authors have striven to comprehensively span the field. You don't have to read from start to finish before you can commence using it.
9 internautes sur 10 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 best o'reilly book I've ever purchased 8 août 2003
Par Brian Wotring - Publié sur
If you develop software, any kind of software, you need this book.
The importance of understanding the security surrounding the development of software is finally being realized. This book provides a complete reference for the secure implementation of common operations that software developers often fail to do correctly.
One of the best things about this book is that it covers so many topics that are often left out of secure programming texts. It is in cookbook format which is really nice for quick reference as well as accommodating readers that have different levels of experience in this area. Both the problem and the solution are explained and real source code is provided leaving the reader with an understanding of the risks, and practical solutions that can be incorporated into their software projects.
The topics that impressed me most were: privilege separation, secure child process creation, executing external processes, safe file and string operations, random number generation, input validation, and the ways to safeguard against many types of attacks. There are also many good tips for safeguarding networked applications. For the more intensive apps, there is in-depth coverage of symmetric and public key crypto, key management, using OpenSSL, and dealing with X.509 certs (including validation techniques).
It's nice to see so much useful information related to secure software development packed into a single resource!
7 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A valuable tool on the programmers bookshelf 16 septembre 2003
Par Dan B. - Publié sur
There are many books on how to write programs in C and C++, and many people learn to write programs from them. What few (if any) of them tell you is the safe way to develop programs. With the release of Secure Programming Cookbook there is now a wealth of knowledge on the subject in one handy tome.
The examples are clearly written and show clearly how the recipe will help in specific or general situations. There are a lot of solid discussion of input validation, environment handling, string handling, access controls, and cryptography. In fact there was more crypto discussion than I expected, but it's all very good and if not applicable today, hopefully it will be some day.
This book is jam packed with excellent examples and discussion of ways to prevent programs from doing bad, and most of the time unexpected or unplanned, things. The diligent C or C++ programmer should add this as yet another volume on the bookshelf tool chest that is next to their desk. Smart programmers will realize that having this book will only help them in the long run.
7 internautes sur 8 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 A task-oriented reference guide 16 octobre 2003
Par Un client - Publié sur
This well-written book covers a lot of topics that I have not read in other books.
Its strengths include:
--Good coverage of cryptography programming
--Task-oriented solutions to specific programming problems
--Easy to navigate "cookbook" style ("with recipes" as the authors call them)
However, some areas of improvement might be:
--Could use more coverage of important subjects (buffer overflows, etc.)
--spends a lot of space on narrower examples (like explaining certain APIs that are documented well online)
--Sometimes jumps into material without much background explanation (which was confusing for me)
It is probably not the first book you should read on the subject. This is more of a recipe guide that is useful if you get stuck on coding a particular topic that happens to be covered. The authors have done a good job of explaining what coverage they do and don't include.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique