Dl4All Logo
Tutorials :

O'Reilly - Secure Programming with C

   Author: Baturi   |   02 July 2021   |   Comments icon: 0



O'Reilly - Secure Programming with C
Duration: 4h 46m | Author: Howard Poston | Video: 1920x1080, 48kHz | 1.1 GB
Genre: eLearning | Language: English
Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation.


Writing a secure code is crucial. Because there is no direct method to handle the exception (no in-built try and catch such as in another high-level language like C#) in the C language, it becomes the responsibility of the C developer to become extra vigilant while writing code. This course begins with a detailed explanation of the overall security of any C application. Further, it provides insights on how to write better C code, particularly a secure code that prevents pitfalls commonly encountered in the C language.
This course shows you how to avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions. You will understand how to eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors.
Table of contents
Chapter 1: Introduction to C
Course Overview
Improving C Application Security
Developing Your First C Program
Identifying Common C Weaknesses
Chapter 2: Preventing Buffer Overflows, Stack-Smashing, and Return-Oriented Programming Attacks
Memory Allocation and the Stack
Buffer Overflow Vulnerabilities
Introduction to ROP
Chapter 3: Correctly Using Formatted Output Functions Without Introducing Format-String Vulnerabilities
Introduction to Format String Specifiers
Format String Vulnerabilities
Chapter 4: Securely Using Different Variable Types
Introduction to Variable Types and Typecasting
Integer Overflow Vulnerabilities
Integer Underflow Vulnerabilities
Chapter 5: Understanding Issues with Pointers
Introduction to Pointers
Potential Pointer Problems
Null Pointer Dereference
Misuse of Freed Pointers
Chapter 6: Performing Secure I/O and Avoiding File System Vulnerabilities
Managing User Input
Securely Performing I/O

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Links are Interchangeable - No Password - Single Extraction

Free O'Reilly - Secure Programming with C, Downloads O'Reilly - Secure Programming with C, Rapidgator O'Reilly - Secure Programming with C, Mega O'Reilly - Secure Programming with C, Torrent O'Reilly - Secure Programming with C, Google Drive O'Reilly - Secure Programming with C.
Feel free to post comments, reviews, or suggestions about O'Reilly - Secure Programming with C including tutorials, audio books, software, videos, patches, and more.

[related-news]



[/related-news]
DISCLAIMER
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator of our site cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

Copyright © 2018 - 2025 Dl4All. All rights reserved.