search for books and compare prices
Tables of Contents for Writing Secure Code
Chapter/Section Title
Page #
Page Count
Part I Contemporary Security
The Need for Secure Systems
3
20
The Proactive Security Development Process
23
28
Security Principles to Live By
51
18
Threat Modeling
69
58
Part II Secure Coding Techniques
Public Enemy #1: The Buffer Overrun
127
44
Determining Appropriate Access Control
171
36
Running with Least Privilege
207
52
Cryptographic Foibles
259
40
Protecting Secret Data
299
42
All Input Is Evil!
341
22
Canonical Representation Issues
363
34
Database Input Issues
397
16
Web-Specific Input Issues
413
26
Internationalization Issues
439
16
Part III Even More Secure Coding Techniques
Socket Security
455
22
Securing RPC, ActiveX Controls, and DCOM
477
40
Protecting Against Denial of Service Attacks
517
18
Writing Secure .NET Code
535
32
Part IV Special Topics
Security Testing
567
48
Performing a Security Code Review
615
12
Secure Software Installation
627
14
Building Privacy into Your Application
641
22
General Good Practices
663
32
Writing Security Documentation and Error Messages
695
42
Part V Appendixes
A Dangerous APIs
713
10
B Ridiculous Excuses We've Heard
723
6
C A Designer's Security Checklist
729
2
D A Developer's Security Checklist
731
6
E A Tester's Security Checklist
737