O'Reilly logo

Building Secure Software: How to Avoid Security Problems the Right Way by Gary McGraw, John Viega

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Access control

basic description of, 187–208

buffer overflows and, 139, 155

compartmentalization and, 204–207

CORBA and, 55

database security and, 382–396

fine-grained privileges and, 207–208

flags, 155

JDB system for, 58–59

Lists (ACLs), 204

mandatory, 207

modifying ownership, 194–195

modifying file attributes, 190–193

programmatic interface and, 195–197

setuid programming and, 197–202

TOCTOU problems and, 222–225

UNIX and for, 187–202

using views for, 385–387

Windows NT and, 202–204

access() function, 215

ACLs (Access Control Lists), 204

Activation records, 153

ActiveX controls (Microsoft), 11, 272

AES, 276, 449–450

assessing the security of, 301

competition for, 449

cryptography libraries and, 272, 274, 277

database security and,

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required