没有合适的资源?快使用搜索试试~ 我知道了~
首页The CERT Oracle Secure Coding Standard for Java
资源详情
资源评论
资源推荐
ptg7041395
Preface iii
The CERT
®
Oracle
®
Secure Coding Standard
for Java
™
Fred Long
Dhruv Mohindra
Robert C. Seacord
Dean F. Sutherland
David Svoboda
Upper Saddle River, NJ • Boston • Indianapolis • San Francisco
New York • Toronto • Montreal • London • Munich • Paris • Madrid
Capetown • Sydney • Tokyo • Singapore • Mexico City
ptg7041395
The SEI Series in Software Engineering
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have
been printed with initial capital letters or in all capitals.
CMM, CMMI, Capability Maturity Model, Capability Maturity Modeling, Carnegie Mellon, CERT, and CERT
Coordination Center are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
ATAM; A rchitec ture Trad eoff A nal ysis M etho d; CMM I nte grat ion; C OTS Usa ge- Risk E valu atio n; CUR E; EPI C; Evo luti on-
ary Process for Integrating COTS Based Systems; Framework for Software Product Line Practice; IDEAL; Interim Profile;
OAR; OCTAVE; Operationally Critical Threat, Asset, and Vulnerability Evaluation; Options Analysis for Reengineering;
Personal Software Process; PLTP; Product Line Technical Probe; PSP; SCAMPI; SCAMPI Lead Appraiser; SCAMPI Lead
Assessor; SCE; SEI; SEPG; Team Software Process; and TSP are service marks of Carnegie Mellon University.
Special permission to reproduce portions of The CERT Oracle Secure Coding Standard for Java, © 2007–2011 by
Carnegie Mellon University, in this book is granted by the Software Engineering Institute.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have
been printed with initial capital letters or in all capitals.
The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty
of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential
damages in connection with or arising out of the use of the information or programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales,
which may include electronic versions and/or custom covers and content particular to your business, training goals,
marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
corpsales@pearsontechgroup.com
For sales outside the United States please contact:
International Sales
international@pearson.com
Visit us on the Web: informit.com/aw
Library of Congress Cataloging-in-Publication Data
The CERT Oracle secure coding standard for Java / Fred Long . . . [et al.].
p. cm.—(The SEI series in software engineering)
Includes bibliographical references and index.
ISBN-13: 978-0-321-80395-5 (pbk. : alk. paper)
ISBN-10: 0-321-80395-7 (pbk. : alk. paper)
1. Java (Computer program language) 2. Computer security. 3. Oracle
(Computer file) 4. Computer programming—Standards. I. Long, F. W.
(Frederick W.), 1947- II. Carnegie-Mellon University. CERT Coordination
Center.
QA76.73.J38C44 2012
005.8—dc23
2011027284
Copyright © 2012 Pearson Education, Inc.
All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or
by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use material from this
work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle
River, New Jersey 07458, or you may fax your request to (201) 236-3290.
ISBN-13: 978-0-321-80395-5
ISBN-10: 0-321-80395-7
Te xt p r in t ed i n t h e U ni te d S t at e s o n r ec yc l e d p a pe r a t E d wa r ds B ro t he r s i n A n n A r b or, M i ch i ga n.
First printing, September 2011
ptg7041395
To m y l a t e w i f e , A n n , f o r a l l h e r l o v e , h e l p , a n d s u p p o r t o v e r t h e y e a r s .
— F r e d L o n g
To m y p a r e n t s D e e p a k a n d E t a M o h i n d r a , m y g r a n d m o t h e r
Shashi Mohindra, and our very peppy, spotted Dalmatian Google.
— D h r u v M o h i n d r a
To m y w i f e , A l fi e , f o r m a k i n g t h i s b o o k w o r t h w h i l e , a n d
to my parents, Bill and Lois, for making it possible.
— D a v i d S v o b o d a
To m y w i f e , R h o n d a , a n d o u r c h i l d r e n , C h e l s e a a n d J o rd a n .
— R o b e r t C . S e a c o r d
For Libby, who makes everything worthwhile.
— D e a n S u t h e r l a n d
ptg7041395
This page intentionally left blank
ptg7041395
vii
Contents
Foreword xvii
Preface xix
Acknowledgments xxxi
About the Authors xxxiii
Chapter 1 Introduction 1
Misplaced Trust 2
Injection Attacks 2
Leaking Sensitive Data 4
Leaking Capabilities 6
Denial of Service 7
Serialization 10
Concurrency, Visibility, and Memory 11
Principle of Least Privilege 18
Security Managers 19
Class Loaders 21
Summary 21
Chapter 2 Input Validation and Data Sanitization (IDS) 23
Rules 23
Risk Assessment Summary 24
IDS00-J. Sanitize untrusted data passed across a trust boundary 24
剩余732页未读,继续阅读
cfy_zhuyu
- 粉丝: 0
- 资源: 5
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
- MW全能培训汽轮机调节保安系统PPT教学课件.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论6