Defensive programming: Difference between revisions

Content deleted Content added
Note that the techniques below are ''not'' sufficient to ensure security: see the articles computer insecurity and secure computing for more information.
* William R. Cheswick and Steven M. Bellovin, <cite>Firewalls and Internet Security:
Line 33:
name of this file, like "/etc/../etc/passwd".
 
 
-------------------------------------
 
Books:
* William R. Cheswick and Steven M. Bellovin, <cite>Firewalls and Internet Security:
Repelling the Wily Hacker</cite> ISBN 0201633574 http://www.wilyhacker.com/
 
External references:
* http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html