Duration: 4h 46m | Author: Howard Poston | Video: 1920x1080, 48kHz | 1.1 GB
Genre: eLearning | Language: English
Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation.
Writing a secure code is crucial. Because there is no direct method to handle the exception (no in-built try and catch such as in another high-level language like C#) in the C language, it becomes the responsibility of the C developer to become extra vigilant while writing code. This course begins with a detailed explanation of the overall security of any C application. Further, it provides insights on how to write better C code, particularly a secure code that prevents pitfalls commonly encountered in the C language.
This course shows you how to avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions. You will understand how to eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors.
Table of contents
Chapter 1: Introduction to C
Course Overview
Improving C Application Security
Developing Your First C Program
Identifying Common C Weaknesses
Chapter 2: Preventing Buffer Overflows, Stack-Smashing, and Return-Oriented Programming Attacks
Memory Allocation and the Stack
Buffer Overflow Vulnerabilities
Introduction to ROP
Chapter 3: Correctly Using Formatted Output Functions Without Introducing Format-String Vulnerabilities
Introduction to Format String Specifiers
Format String Vulnerabilities
Chapter 4: Securely Using Different Variable Types
Introduction to Variable Types and Typecasting
Integer Overflow Vulnerabilities
Integer Underflow Vulnerabilities
Chapter 5: Understanding Issues with Pointers
Introduction to Pointers
Potential Pointer Problems
Null Pointer Dereference
Misuse of Freed Pointers
Chapter 6: Performing Secure I/O and Avoiding File System Vulnerabilities
Managing User Input
Securely Performing I/O
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
https://uploadgig.com/file/download/88f8d53929c0cc1f/8cyo6.Secure.Programming.with.C.part1.rar
https://uploadgig.com/file/download/9f7a5229F1c4A10e/8cyo6.Secure.Programming.with.C.part2.rar
https://rapidgator.net/file/0a7d40c9456283e9fd0b27aaedb7c6ee/8cyo6.Secure.Programming.with.C.part1.rar.html
https://rapidgator.net/file/d145f4a1cbc187f8fdc09fabd7e95baa/8cyo6.Secure.Programming.with.C.part2.rar.html
http://nitroflare.com/view/60968DCCED75592/8cyo6.Secure.Programming.with.C.part1.rar
http://nitroflare.com/view/FFD8611656F7B2A/8cyo6.Secure.Programming.with.C.part2.rar