O'Reilly logo

Code Craft by Pete Goodliffe

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Get Thinking

A detailed discussion of the following questions can be found in the "Appendix A" section on page 515.

Mull It Over

  1. What is a "secure" program?

  2. What input must be validated in a secure program? What sort of validation is required?

  3. How can you guard against attacks from the pool of trusted users?

  4. Where can an exploitable buffer overrun occur? What functions are particularly prone to buffer overrun?

  5. Can you avoid buffer overruns altogether?

  6. How can you secure the memory in use by your application?

  7. Are C and C++ inherently less secure than alternative languages?

  8. Has the experience of C led to C++ being a better, more securely designed language?

  9. How do you know when your program has been compromised?

Getting Personal

  1. What are the security requirements ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required