Buyezee Österreich
Buyezee Canada
Buyezee France
Buyezee Deutschland
Buyezee Italia
Buyezee Nederland
Buyezee España
Buyezee Schweiz
Buyezee Thailand
Buyezee United Kingdom
United Kingdom
Buyezee United States
United States
Buyezee Việt Nam
Việt Nam
Meine Favoriten Meine Favoriten (0)
Favorit hinzugefügt! Favoriten Aktualisiert!

The CERT Oracle Secure Coding Standard for Java

New Kobo Germany
Auf Lager
In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn't mean that security is assured automatically. A set of standard practices has evolved over the years. The Secure® Coding® Standard for Java™ is a compendium of these practices. These are not theoretical research papers or product marketing blurbs. This is all serious, mission-critical, battle-tested, enterprise-scale stuff." -James A. Gosling, Father of the Java Programming Language An essential element of secure coding in the Java programming language is a well-documented and enforceable coding standard. Coding standards encourage programmers to follow a uniform set of rules determined by the requirements of the project and organization, rather than by the programmer's familiarity or preference. Once established, these standards can be used as a metric to evaluate source code (using manual or automated processes). The CERT® Oracle® Secure Coding Standard for Java™ provides rules designed to eliminate insecure coding practices that can lead to exploitable vulnerabilities. Application of the standard's guidelines will lead to higher-quality systems-robust systems that are more resistant to attack. Such guidelines are required for the wide range of products coded in Java-for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics. After a high-level introduction to Java application security, seventeen consistently organized chapters detail specific rules for key areas of Java development. For each area, the authors present noncompliant examples and corresponding compliant solutions, show how to assess risk, and offer references for further information. Each rule is prioritized based on the severity of consequences, likelihood of introducing exploitable vulnerabilities, and cost of remediation. The sta
Marke:Addison-Wesley Professional
EAN:Addison-Wesley Professional
Addison-Wesley Professional
Addison-Wesley Professional