Get Hack Proofing Your Network, 2nd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
Solutions in this chapter:
Understanding Why Unexpected Data Is Dangerous
Finding Situations Involving Unexpected Data
Using Techniques to Find and Eliminate Vulnerabilities
Utilizing the Available Safety Features in Your Programming Language
Using Tools to Handle Unexpected Data
Solutions Fast Track