The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software ...
Read More
The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process "We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software." - Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language "'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know." - David Wagner, Associate Professor, University of California Berkeley "Software developers are the first and best line of defense for the security of their code. This book gives them the security development knowledge and the tools they need in order to eliminate vulnerabilities before they move into the final products that can be exploited." - Howard A. Schmidt, Former White House Cyber Security Advisor BRIAN CHESS is Founder and Chief Scientist of Fortify Software, where his research focuses on practical methods for creating secure systems. He holds a Ph.D. in Computer Engineering from University of California Santa Cruz, where he studied the application of static analysis to finding security-related code defects. JACOB WEST manages Fortify Software's Security Research Group, which is responsible for building security knowledge into Fortify's products. He brings expertise in numerous programming languages, frameworks, and styles together with deep knowledge about how real-world systems fail. CD contains a working demonstration version of Fortify Software's Source Code Analysis (SCA) product; extensive Java and C code samples; and the tutorial chapters from the book in PDF format. Part I: Software Security and Static Analysis 1 1 The Software Security Problem 3 2 Introduction to Static Analysis 21
Read Less
Add this copy of Secure Programming With Static Analysis [With Cdrom] to cart. $2.36, like new condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis [With Cdrom] to cart. $2.36, very good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis [With Cdrom] to cart. $2.36, very good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis [With Cdrom] to cart. $2.36, very good condition, Sold by ThriftBooks-Baltimore rated 5.0 out of 5 stars, ships from Halethorpe, MD, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis to cart. $2.62, good condition, Sold by Goodwill Books rated 5.0 out of 5 stars, ships from Hillsboro, OR, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis to cart. $2.62, good condition, Sold by Goodwill rated 4.0 out of 5 stars, ships from Brooklyn Park, MN, UNITED STATES, published 2007 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Corners are bent. Stains on outside cover/inside the book. Cover/Case has some rubbing and edgewear. Access codes, CD's, slipcovers and other accessories may not be included.
Add this copy of Secure Programming With Static Analysis to cart. $2.92, good condition, Sold by Goodwill of Colorado rated 5.0 out of 5 stars, ships from COLORADO SPRINGS, CO, UNITED STATES, published 2007 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
This item is in overall good condition. Covers and dust jackets are intact but may have minor wear including slight curls or bends to corners as well as cosmetic blemishes including stickers. Pages are intact but may have minor highlighting/ writing. Binding is intact; however, spine may have slight wear overall. Digital codes may not be included and have not been tested to be redeemable and/or active. Minor shelf wear overall. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you!
Add this copy of Secure Programming With Static Analysis to cart. $5.00, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2007 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Secure Programming With Static Analysis to cart. $6.01, very good condition, Sold by tttkelly1 rated 4.0 out of 5 stars, ships from Missouri City, TX, UNITED STATES, published 2007 by Addison-Wesley Professional.
Add this copy of Secure Programming With Static Analysis to cart. $7.99, very good condition, Sold by FirstClassBooks rated 4.0 out of 5 stars, ships from Little Rock, AR, UNITED STATES, published 2007 by Addison-Wesley Professional.