онтакты/ѕроезд  ƒоставка и ќплата ѕомощь/¬озврат
»стори€
  +7(495) 980-12-10
  пн-пт: 10-20 сб-вс: 11-18
  shop@logobook.ru
   
    ѕоиск книг                    ѕоиск по списку ISBN –асширенный поиск    
Ќайти
  «арубежные издательства –оссийские издательства  
јвторы |  аталог книг | »здательства | Ќовинки | ”чебна€ литература | јкции | Cертификаты | ’иты | |
 

Secure Coding in C and C++



—ейчас книги нет в продаже.
¬озможно по€витс€ в будущем.

јвтор: Seacord Robert
Ќазвание:  Secure Coding in C and C++
»здательство: Pearson Education
 лассификаци€:
ISBN: 0321822137
ISBN-13(EAN): 9780321822130
ќбложка/‘ормат: Paperback
—траницы: 450
¬ес: 0.97 кг.
ƒата издани€: 29.03.2013
язык: English
»здание: 2 rev ed
»ллюстрации: Illustrations
–азмер: 178 x 232 x 30
„итательска€ аудитори€: Professional & vocational
–ейтинг:
ѕоставл€етс€ из: —Ўј
ќписание: Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities.

Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrows attacks, not just todays. Drawing on the CERTs reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Coverage includes technical detail on how to

  • Improve the overall security of any C or C++ application
  • Thwart buffer overflows, stack-smashing, and return-oriented programming attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors
  • Perform secure I/O, avoiding file system vulnerabilities
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid race conditions and other exploitable vulnerabilities while developing concurrent code

The second edition features

  • Updates for C11 and C++11
  • Significant revisions to chapters on strings, dynamic memory management, and integer security
  • A new chapter on concurrency
  • Access to the online secure coding course offered through Carnegie Mellons Open Learning Initiative (OLI)

Secure Coding in C and C++, Second Edition, presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If youre responsible for creating secure C or C++ software-or for keeping it safe-no other book offers you this much detailed, expert assistance.





Topics in Geometry, Coding Theory and Cryptography

јвтор: Garcia Arnaldo, Stichtenoth Henning
Ќазвание: Topics in Geometry, Coding Theory and Cryptography
ISBN: 1402053339 ISBN-13(EAN): 9781402053337
»здательство: Springer
–ейтинг:
÷ена: 10449 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory, such as coding theory, sphere packings and lattices, sequence design, and cryptography. The use of function fields often led to better results than those of classical approaches.This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction between function fields and their various applications; in particular the structure and the number of rational places of function fields are of great significance. The topics focus on material which has not yet been presented in other books or survey articles. Wherever applications are pointed out, a special effort has been made to present some background concerning their use.

Secure Mobile Ad-hoc Networks and Sensors / First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

јвтор: Burmester Mike, Yasinsac Alec
Ќазвание: Secure Mobile Ad-hoc Networks and Sensors / First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers
ISBN: 3540366466 ISBN-13(EAN): 9783540366461
»здательство: Springer
–ейтинг:
÷ена: 6791 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005.The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.

Coding and Cryptography / International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers

јвтор: Ytrehus √Шyvind
Ќазвание: Coding and Cryptography / International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers
ISBN: 3540354816 ISBN-13(EAN): 9783540354819
»здательство: Springer
–ейтинг:
÷ена: 9404 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., error-correcting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties.

Security with Noisy Data / Private Biometrics, Secure Key Storage and Anti-Counterfeiting

јвтор: Tuyls Pim, ≈ koric Boris, Kevenaar Tom
Ќазвание: Security with Noisy Data / Private Biometrics, Secure Key Storage and Anti-Counterfeiting
ISBN: 1846289831 ISBN-13(EAN): 9781846289835
»здательство: Springer
–ейтинг:
÷ена: 14629 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides an overview of the techniques and applications of security based on noisy data. It also covers the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting.

Cryptography and Coding / 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings

јвтор: Smart Nigel
Ќазвание: Cryptography and Coding / 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
ISBN: 354030276X ISBN-13(EAN): 9783540302766
»здательство: Springer
–ейтинг:
÷ена: 9404 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005.The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.

Secure Data Management / Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

јвтор: Jonker Willem, Petkovic Milan
Ќазвание: Secure Data Management / Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
ISBN: 3540287981 ISBN-13(EAN): 9783540287988
»здательство: Springer
–ейтинг:
÷ена: 7314 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

јвтор: Poovendran Radha, Wang Cliff, Roy Sumit
Ќазвание: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 0387327215 ISBN-13(EAN): 9780387327211
»здательство: Springer
–ейтинг:
÷ена: 22989 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging.Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks.

Secure Data Management in Decentralized Systems

јвтор: Yu Ting, Jajodia Sushil
Ќазвание: Secure Data Management in Decentralized Systems
ISBN: 0387276947 ISBN-13(EAN): 9780387276946
»здательство: Springer
–ейтинг:
÷ена: 17241 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices.Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.

Secure Data Management / VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings

јвтор: Jonker Willem, Petkovic Milan
Ќазвание: Secure Data Management / VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings
ISBN: 3540229833 ISBN-13(EAN): 9783540229834
»здательство: Springer
–ейтинг:
÷ена: 6791 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.

Compression and Coding Algorithms

јвтор: Moffat Alistair, Turpin Andrew
Ќазвание: Compression and Coding Algorithms
ISBN: 0792376684 ISBN-13(EAN): 9780792376682
»здательство: Springer
–ейтинг:
÷ена: 9766 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: An authoritative reference to the whole area of source coding algorithms, Compression and Coding Algorithms will be a primary resource for both researchers and software engineers. The book also will be interest for people in broader area of design and analysis of algorithms and data structure. Practitioners, especially those who work in the software development and independent consulting industries creating compression software or other applications systems, in which compression plays a part, will benefit from techniques that are described. Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.The detailed pseudo-code presentation of over thirty algorithms, and careful explanation of examples, make this book approachable and authoritative. Compression and throughput results are presented where appropriate, and serve as a validation of the assessments and recommendation made in the text. The combination of implementation detail, thoughtful discussions, and careful presentation means that this book will occupy a pivotal role in this area for many years. In-depth coverage of the crucial areas of minimum-redundancy coding, arithmetic coding, adaptive coding make Compression and Coding Algorithms unique in its field.

Error Coding for Engineers

јвтор: Houghton A.
Ќазвание: Error Coding for Engineers
ISBN: 079237522X ISBN-13(EAN): 9780792375227
»здательство: Springer
–ейтинг:
÷ена: 18282 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Error Coding for Engineers provides a useful tool for practicing engineers, students, and researchers, focusing on the applied rather than the theoretical. It describes the processes involved in coding messages in such a way that, if errors occur during transmission or storage, they are detected and, if necessary, corrected. Very little knowledge beyond a basic understanding of binary manipulation and Boolean algebra is assumed, making the subject accessible to a broad readership including non-specialists. The approach is tutorial: numerous examples, illustrations, and tables are included, along with over 30 pages of hands-on exercises and solutions. Error coding is essential in many modern engineering applications. Engineers involved in communications design, DSP-based applications, IC design, protocol design, storage solutions, and memory product design are among those who will find the book to be a valuable reference. Error Coding for Engineers is also suitable as a text for basic and advanced university courses in communications and engineering.

Principles of Verifiable RTL Design / A Functional Coding Style Supporting Verification Processes in Verilog

јвтор: Bening Lionel, Foster Harry D.
Ќазвание: Principles of Verifiable RTL Design / A Functional Coding Style Supporting Verification Processes in Verilog
ISBN: 0792373685 ISBN-13(EAN): 9780792373681
»здательство: Springer
–ейтинг:
÷ена: 19531 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: The first edition of Principles of Verifiable RTL Design offered a common sense method for simplifying and unifying assertion specification by creating a set of predefined specification modules that could be instantiated within the designer's RTL. Since the release of the first edition, an entire industry-wide initiative for assertion specification has emerged based on ideas presented in the first edition. This initiative, known as the Open Verification Library Initiative (www.verificationlib.org), provides an assertion interface standard that enables the design engineer to capture many interesting properties of the design and precludes the need to introduce new HDL constructs (i.e., extensions to Verilog are not required). Furthermore, this standard enables the design engineer to `specify once,' then target the same RTL assertion specification over multiple verification processes, such as traditional simulation, semi-formal and formal verification tools. The Open Verification Library Initiative is an empowering technology that will benefit design and verification engineers while providing unity to the EDA community (e.g., providers of testbench generation tools, traditional simulators, commercial assertion checking support tools, symbolic simulation, and semi-formal and formal verification tools). The second edition of Principles of Verifiable RTL Design expands the discussion of assertion specification by including a new chapter entitled `Coverage, Events and Assertions'. All assertions exampled are aligned with the Open Verification Library Initiative proposed standard. Furthermore, the second edition provides expanded discussions on the following topics: start-up verification; the place for 4-state simulation; race conditions; RTL-style-synthesizable RTL (unambiguous mapping to gates); more `bad stuff'. The goal of the second edition is to keep the topic current. Principles of Verifiable RTL Design, A Functional Coding Style Supporting Verification Processes, Second Edition tells you how you can write Verilog to describe chip designs at the RTL level in a manner that cooperates with verification processes. This cooperation can return an order of magnitude improvement in performance and capacity from tools such as simulation and equivalence checkers. It reduces the labor costs of coverage and formal model checking by facilitating communication between the design engineer and the verification engineer. It also orients the RTL style to provide more useful results from the overall verification process.


ќќќ "Ћогосфера " “ел:+7(495) 980-12-10 www.logobook.ru
   ¬  онтакте     ¬  онтакте ћед  ћобильна€ верси€