List of Tables

2.1

Testing Extreme Conditions

28

2.2

Example Values for Testing an End-Exclusive Asymmetric Range

28

2.3

Ranges of Integer Quantities

49

2.4

Argument Type Checking at Different Stages of a Program’s Lifetime

58

2.5

Enforcing a Class’s Usage in C++

68

3.1

A List of Open Network Ports on a Unix Server

105

3.2

A List of Open Network Ports on a Windows Workstation

106

3.3

The Stack During the ftpd Buffer Exploitation Attack

109

3.4

Unwinding the Stack (default case)

110

3.5

Unwinding the Stack During the Exploit

111

3.6

Unsafe C Functions and their Safer Alternatives

116

3.7

The Java 2 Platform SE 5.0 Permissions

142

4.1

Timing Profile Characterization, Diagnostic Tools, and Resolution Options

158

4.2

Overhead Introduced by Context Switching and Interprocess Communication ...

Get Code Quality now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.