Logo

Secure Programming for Linux and Unix HOWTO

Secure Programming for Linux and Unix HOWTO
by

Description:
This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.

Home page url

Download or read it online for free here:
Download link
(700KB, PDF)

Similar books

Book cover: Writing GNOME ApplicationsWriting GNOME Applications
by - Addison-Wesley Professional
This book will help Linux programmers learn the basics of GNOME and understand how to write applications using this environment. Focusing on the essentials, the book guides you through GNOME's elements and explains how these elements function.
(15064 views)
Book cover: IBM Certification Study Guide AIX V4.3 System AdministrationIBM Certification Study Guide AIX V4.3 System Administration
by - IBM
This is a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators develop the knowledge and skills required for the certification.
(18297 views)
Book cover: The Craft of Text EditingThe Craft of Text Editing
by - Lulu.com
This book covers all aspects of creating a character-based text editor. In the process, it discusses many aspects of creating a large application program including user interface, speed/memory/I/O tradeoffs, and many other considerations.
(9815 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(6851 views)