Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development processafrom designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authorsatwo battle-scarred veterans who have solved some of the industryas toughest security problemsaprovide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.... decrypt the data. You can also use LSA secrets (LsaStorePrivateData and LsaRetrievePrivateData) as ... Four types of LSA secrets exist: local data, global data, machine data, and private data. ... LSA code is complex; DPAPI code is simple!
|Title||:||Writing Secure Code|
|Author||:||David LeBlanc, Michael Howard|
|Publisher||:||Pearson Education - 2002-12-04|