21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

Preface<br />

We don’t think we need to tell you that writing secure software is incredibly difficult,<br />

even for the experts. We’re not going to waste any time trying to convince you<br />

to start thinking about security—we assume you’re already doing that.<br />

Our goal here is to provide you with a rich set of code samples that you can use to<br />

help secure the C and C++ programs you write, for both Unix * and Windows environments.<br />

There are already several other books out there on the topic of writing secure software.<br />

Many of them are quite good, but they universally focus on the fundamentals,<br />

not code. That is, they cover basic secure programming principles, and they usually<br />

explain how to design for security and perform risk assessments. Nevertheless, none<br />

of them show you by example how to do such things as SSL-enable your applications<br />

properly, which can be surprisingly difficult.<br />

Fundamental software security skills are important, and everybody should master<br />

them. But, in this book, we assume that you already have the basics under your belt.<br />

We do talk about design considerations, but we do so compactly, focusing instead<br />

on getting the implementation details correct. If you need a more in-depth treatment<br />

of basic design principles, there are now several good books on this topic, including<br />

Building Secure Software (Addison Wesley). In addition, on this book’s web site, we<br />

provide links to background resources that are available on the Internet.<br />

More Than Just a Book<br />

There is no way we could cover all the topics we wanted to cover in a reasonable<br />

number of pages. In this book, we’ve had to focus on the recipes and technologies<br />

we thought would be most universally applicable. In addition, we’ve had to focus on<br />

* We know Linux is not a true Unix, but we will lump it in there throughout this book for the sake of convenience.<br />

xvii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!