Thursday, November 12, 2009

References for More Information










Perl for System AdministrationSearch this book









1.7. References for More Information








http://dwheeler.com/secure-programs/Secure-Programs-HOWTO.html is a HOWTO document for secure programming under Linux, but the concepts and techniques are applicable to other situations as well.



http://www.cs.ucdavis.edu/~bishop/secprog.html contains more good secure programming resources from security expert Matt Bishop.



http://www.homeport.org/~adam/review.html lists security code review guidelines by Adam Shostack.



http://www.dnaco.net/~kragen/security-holes.html is a good paper on how to find security holes (especially in your own code) by Kragen Sitaker.



http://www.shmoo.com/securecode/ offers an excellent collection of articles on how to write secure code.



Perl CGI Problems, by Rain Forrest Puppy (Phrack Magazine, 1999) can be found online at http://www.insecure.org/news/P55-07.txt or from the Phrack archives at http://www.phrack.com/archive.html.



Perl Cookbook, by Tom Christiansen and Nathan Torkington (O'Reilly, 1998) contains many good tips on coding securely.
















Copyright © 2001 O'Reilly & Associates. All rights reserved.







No comments:

Post a Comment