|Listed in category:
Have one to sell?

24 Deadly Sins of Software - Paperback, by Howard Michael; LeBlanc - Good

US $10.00
ApproximatelyAU $15.41
Condition:
Good
Breathe easy. Returns accepted.
Postage:
US $4.63 (approx. AU $7.14) USPS Media MailTM.
Located in: New Market, Virginia, United States
Delivery:
Estimated between Fri, 30 May and Thu, 5 Jun to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the postage service selected, the seller's postage history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
14-day returns. Buyer pays for return postage. If you use an eBay postage label, it will be deducted from your refund amount.
Payments:
     Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:226585289330
Last updated on 20 Feb, 2025 01:35:35 AEDSTView all revisionsView all revisions

Item specifics

Condition
Good: A book that has been read but is in good condition. Very minimal damage to the cover including ...
Book Title
24 Deadly Sins of Software Security: Programming Flaws and How to
ISBN
9780071626750

About this product

Product Identifiers

Publisher
Mcgraw-Hill Education
ISBN-10
0071626751
ISBN-13
9780071626750
eBay Product ID (ePID)
72678414

Product Key Features

Number of Pages
432 Pages
Publication Name
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Language
English
Publication Year
2009
Subject
Programming / General, Networking / General, Security / General, General
Type
Textbook
Subject Area
Computers
Author
John Viega, Michael Howard, David LeBlanc
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
26.2 Oz
Item Length
9.2 in
Item Width
7.4 in

Additional Product Features

Intended Audience
Trade
LCCN
2009-031994
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Part I: Web Application Sins ; Chapter 1: SQL Injection; Chapter 2: Server Side Cross-Site Scripting; Chapter 3: Web-Client Related Vulnerabilities; Part II: Implementation Sins ; Chapter 4: Use of Magic URLs Chapter 5: Buffer Overruns; Chapter 6: Format String Problems; Chapter 7: Integer Overflows; Chapter 8: C++ Catastrophes; Chapter 9: Catching All Exceptions; Chapter 10: Command Injection; Chapter 11: Failure to Handle Errors; Chapter 12: Information Leakage; Chapter 13: Race Conditions; Chapter 14: Poor Usability; Chapter 15: Not Updating Easily; Part III: Cryptographic Sins ; Chapter 16: Not Using Least Priveleges; Chapter 17: Weak Password Systems; Chapter 18: Unauthenticated Key Exchange; Chapter 19: Random Numbers; Part IV: Networking Sins ;Chapter 20: Wrong Algorithm; Chapter 21: Failure to Protect Network Traffic; Chapter 22: Trusting Name Resolution; Part V: Stored Data Sins ; Chapter 23: Improper Use of SSL/TLS; Chapter 24: Failure to Protect Stored Data
Synopsis
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution
LC Classification Number
QA76.9.A25H6977 2009

Item description from the seller

About this seller

ieatcornbread

98.6% positive Feedback733 items sold

Joined Feb 2012
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months
Accurate description
4.7
Reasonable postage costs
4.8
Postage speed
4.9
Communication
4.9

Seller feedback (300)

All ratings
Positive
Neutral
Negative

Product ratings and reviews

5.0
2 product ratings
  • 2 users rated this 5 out of 5 stars
  • 0 users rated this 4 out of 5 stars
  • 0 users rated this 3 out of 5 stars
  • 0 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • Good for laying a foundation of understanding within the field of software security

    In the cyber security world things are changing quickly, but without a foundation for understanding it you can’t learn the new things. This book does a good job of laying the foundation of this part of the field. This is a good book for those interested in learning software security.

    Verified purchase: YesCondition: Pre-ownedSold by: havilahgold

  • Good

    Good

    Verified purchase: YesCondition: Pre-ownedSold by: second.sale