software design
Home » computers » programming » software design » building secure software how to avoid security pr
|
Aftersleep Books
|
||||||||||||||||||||
Building Secure Software How to Avoid Security PrThe following report compares books using the SERCount Rating (base on the result count from the search engine). |
|||||||||||||||||||||
|
Aftersleep Books - 2005-06-20 07:00:00 | © Copyright 2004 - www.aftersleep.com () | sitemap | top |
The first 6 chapters can be read and understood by programmers and managment alike. The first 6 chapters should be required reading for any security professional or manager. They discuss software engineering and how vulnerabilities creep into the software. The remainder of the book is geared towards secure coding technques. The techniques discussed can be applied to most languages and many languages are discussed, however, the slant here is towards C.
All of the helpful code samples are available at the book's web site. This 2-year old text will be relevant for years to come. It's easy to read overall, but I found it a bit dry in a couple of spots. This book deserves 5 stars for relevance and author knowledge and 3 for price. I read it cover to cover and enjoyed it. I've found it useful as a reference on occasion after the read.