search for books and compare prices
Tables of Contents for Writing Secure Code
Chapter/Section Title
Page #
Page Count
Part I Contemporary Security
The Need for Secure Systems
3
16
Designing Secure Systems
19
44
Part II Secure Coding Techniques
Public Enemy #1: the Buffer Overrun
63
26
Determining Good Access Control
89
30
Running with Least Privilege
119
40
Cryptographic Foibles
159
30
Storing Secrets
189
22
Canonical Representation Issues
211
28
Part III Network-Based Application Considerations
Socket Security
239
18
Securing RPC, ActiveX Controls, and DCOM
257
36
Protecting Against Denial of Service Attacks
293
14
Securing Web-Based Services
307
34
Part IV Special Topics
Writing secure .NET Code
341
22
Testing Secure Applications
363
36
Secure Software Installation
399
12
General Good Practices
411
48
Part V Appendixes
A Dangerous APIs
433
4
B The Ten Immutable Laws of Security
437
8
C The Ten Immutable Laws of Security Administration
445
8
D Lame Excuses we've Heard
453
6
A Final Thought
459