Check nearby libraries
Buy this book
"Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's."--BOOK JACKET.
Check nearby libraries
Buy this book
| Edition | Availability |
|---|---|
| 1 |
zzzz
|
| 2 |
aaaa
|
Book Details
Edition Notes
Includes bibliographical references and index.
Classifications
External Links
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created April 1, 2008
- 14 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
| April 22, 2025 | Edited by MARC Bot | import existing book |
| January 27, 2025 | Edited by MARC Bot | import existing book |
| December 19, 2023 | Edited by ImportBot | import existing book |
| November 18, 2022 | Edited by ImportBot | import existing book |
| April 1, 2008 | Created by an anonymous user | Imported from Scriblio MARC record |

