Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
220 Chapter 6 • Code Auditing and Reverse Engineering
external library/program (reducing the potential for problems within
external portion), or blindly trusting it.Which route you choose
depends on the circumstances.You can probably trust system libraries,
but be suspicious of other third-party code.When in doubt, go with
your instincts. If your instincts are failing you, then be paranoid instead
and don’t trust it—you can never be too cautious.
In this approach, we will also be focusing on a programmatical
approach—that is, we will focus on the actual (mis)uses of certain func-
tions and the programming language in general.We do not focus on
logic-based ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312