July 2018
Intermediate to advanced
356 pages
9h 18m
English
Secure architecture design and threat modeling are followed by the secure coding phase. In the coding phase, we would like to avoid the use of unsafe APIs, buffer overflow, sensitive information leakage, and so on. It's difficult for every developer to be familiar with all secure coding rules. Therefore, how to apply secure coding tools and tips to spot major security issue will be discussed in this chapter.
We will cover the following topics in this chapter: