World Library  

Add to Book Shelf
Flag as Inappropriate
Email this Book

Secure Programming for Linux and Unix Howto

By Wheeler, David A.

Click here to view

Book Id: WPLBN0003760767
Format Type: PDF eBook :
File Size:
Reproduction Date: 2015

Title: Secure Programming for Linux and Unix Howto  
Author: Wheeler, David A.
Language: English
Subject: Programming, Unix Linux, Unix Security
Collections: Technical eBooks and Manuals Collection, Technical Books Center Collection
Publication Date:
Publisher: Technical Books Center


APA MLA Chicago

Wheeler, D. A. (2004). Secure Programming for Linux and Unix Howto. Retrieved from

Description: This note covers the following topics: background, history of unix, linux, and open source, security principles, why do programmers write insecure code?, is open source good for security?, types of secure programs, paranoia is a virtue, why did i write this document?, sources of design and implementation guidelines, other sources of security information, document conventions, summary of linux and unix security features, processes, files, system v ipc, sockets and network connections, signals, quotas and limits, dynamically linked libraries, audit, pam, specialized security extensions for unix-like systems, security requirements, common criteria introduction, security environment and objectives,validate all input, command line, environment variables, file descriptors, file names, file contents, web-based application inputs (especially cgi scripts), other inputs, human language (locale) selection, character encoding, prevent cross-site malicious content on input, filter html/uris that may be re-presented, remove or forbid some html data, encoding html data, validating html data, validating hypertext links (uris/urls), other html tags, related issues, forbid http get to perform non-queries, counter spam, limit valid input time and load level, avoid buffer overflow, dangers in c/c++, library solutions in c/c++, standard c library solution, static and dynamically allocated buffers, strlcpy and strlcat, libmib, c++ std

Table of Contents
TOC : Introduction - Background - Summary of Linux and Unix Security Features - Security Requirements - Validate All Input - Avoid Buffer Overflow - Design Your Program for Security - Carefully Call Out to Other Resources - Send Information Back Judiciously - Language-Specific Issues - Special Topics.


Click To View

Additional Books

  • Think Complexity, Version 1.2.2 (by )
  • Formal Syntax and Semantics of Programmi... (by )
  • The Little Book of Semaphores (by )
  • Introduction to Software Development (by )
  • Learn Vimscript the Hard Way (by )
  • ASTUDENT_Scratch_Programming (by )
  • Semantics with Applications, a Formal In... (by )
  • The Gentle Compiler Construction System (by )
  • Programming from the Ground up (by )
  • Algorithms (by )
  • Programming Languages: Application and I... (by )
  • Beej’s Guide to Network Programming, Usi... (by )
Scroll Left
Scroll Right


Copyright © World Library Foundation. All rights reserved. eBooks from World Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.