Penguin
Note: You are viewing an old revision of this page. View the current version.

Secure Programming for Linux and Unix HOWTO

David A. Wheeler

Copyright (c) 1999, 2000, 2001, 2002 by David A. Wheeler

HowToSecureProgramsHOWTO1 Introduction HowToSecureProgramsHOWTO2 Background HowToSecureProgramsHOWTO3 Processes HowToSecureProgramsHOWTO4 Validate All Input HowToSecureProgramsHOWTO5 Avoid Buffer Overflow HowToSecureProgramsHOWTO6 Structure Program Internals and Approach HowToSecureProgramsHOWTO7 Carefully Call Out to Other Resources HowToSecureProgramsHOWTO8 Send Information Back Judiciously HowToSecureProgramsHOWTO9 Language-Specific Issues HowToSecureProgramsHOWTO10 Special Topics HowToSecureProgramsHOWTO11 Conclusion HowToSecureProgramsHOWTO12 Bibliography HowToSecureProgramsHOWTO13 Appendicies