TITLE

Secure Coding: Principles & Practices

PUB. DATE
August 2003
SOURCE
Database & Network Journal;Aug2003, Vol. 33 Issue 4, p17
SOURCE TYPE
Periodical
DOC. TYPE
Book
ABSTRACT
Features the book 'Secure Coding: Principles and Practices.' Advice about performing security retroffiting; Factors involved in the entire code lifecycle.
ACCESSION #
10825379

 

Related Articles

  • Research on Smartphone Application malicious behavior evaluation using Fuzzy Analytical Hierarchy Process. WuYinhe; LiDaiping // Applied Mechanics & Materials;2014, Issue 644-650, p5733 

    Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data. Consequently, it may cause many problems, such as privacy disclosure, mobile phone virus,...

  • The Never-Ending Saga of Insecure Software. SAVAGE, MARCIA // Information Security;Jul/Aug2010, Vol. 12 Issue 6, p5 

    The article discusses the importance of software security and security coding. It notes that companies have been affected by the number of staff hours spent on installing patches and remediation for its software, and damage to its reputation arising from breaches in software security....

  • CYCLICITY AND DECODING OF LINEAR ERROR-BLOCK CODES. DARITI, RABII; SOUIDI, EL MAMOUN // Journal of Theoretical & Applied Information Technology;3/15/2011, Vol. 25 Issue 1, p39 

    Linear error-block codes (LEBC) were introduced in [1]. They are a natural generalization of linear error correcting codes. In this paper, we introduce a notion of cyclic LEBC. In order to allow application in cryptography, especially in a McEliece-like cryptosystem [3], a method of decoding...

  • LATTICE-BASED STRONG DESIGNATE VERIFIER SIGNATURE AND ITS APPLICATIONS. Fenghe Wang; Yupu Hu; Baocang Wang // Malaysian Journal of Computer Science;Jan2012, Vol. 25 Issue 1, p11 

    Motivated by the need to have secure strong designate verifier signatures (SDVS) even in the presence of quantum computers, a post-quantum lattice-based SDVS scheme is proposed based on the hardness of the short integer solution problem (SIS) and the learning with errors problem (LWE). The...

  • Challenges in Building Secure Software. Howles, Trudy; McQuaid, Patricia A. // Software Quality Professional;Jun2012, Vol. 14 Issue 3, p4 

    Software security is an area of utmost concern for software professionals and is one of the primary concerns of most organizations. To be effective, software security cannot be an afterthought, but must be designed into the system. Education and awareness are critical because it is too risky and...

  • Foreign Key Constraints (Without NOCHECK) Boost Performance and Data Integrity.  // SQL Server Magazine;Nov2004, Vol. 6 Issue 11, p11 

    Features the foreign key constraints that improve and boost performance and data integrity in computers. Components of Listing 1; Usability of the query showed in Listing 2; Results on using NOCHECK when creating foreign key constraints.

  • Introduction to a New Abelian Group of n-Tuples. Singh, Sudha; Singh, M. K. // IUP Journal of Computational Mathematics;Dec2011, Vol. 4 Issue 4, p18 

    This paper introduces a new arithmetic group of n-tuples. Properties of circulant matrix and Galois field of prime order have been used in the construction. This group of n-tuples is highly useful in information security, cryptography, coding theory, communication and image processing.

  • INFORMATION HIDING USING AUDIO STEGANOGRAPHY -- A SURVEY. P., Jayaram; H. R., Ranganatha; H. S., Anupama // International Journal of Multimedia & Its Applications;Aug2011, Vol. 3 Issue 3, p86 

    Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is Steganography,...

  • Generating visible RSA public keys for PKI. Laih, C.S.; Chen, K.Y. // International Journal of Information Security;2004, Vol. 2 Issue 2, p103 

    In this paper, we propose the general procedures for generating a visible RSA public key for overcoming the drawback of people (without cryptographic background) not understanding what is meant by “public key”. Instead of generating a randomlike public key, a visible public key...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics