21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

igger risks than anticipated. You should expect that it may happen to you, too,<br />

no matter what you know about security. One caveat: you should not use the<br />

code in this book as if it were a code library you can simply link against. You<br />

really need to read the text and understand the problems our code is built to<br />

avoid to make sure that you actually use our code in the way it was intended.<br />

This is no different from any other API, where you really should RTFM thoroughly<br />

before coding if you want to have a chance of getting things right.<br />

Despite the shortcomings some readers may find, we think this book has a great deal<br />

to offer. In addition, we will do the best job we can to supplement this book on the<br />

Web in hopes of making the material even better.<br />

Organization of This Book<br />

Because this book is a cookbook, the text is not presented in tutorial style; it is a<br />

comprehensive reference, filled with code that meets common security needs. We do<br />

not intend for this book to be read straight through. Instead, we expect that you will<br />

consult this book when you need it, just to pick out the information and code that<br />

you need.<br />

To that end, here is a strategy for getting the most out of this book:<br />

• Each recipe is named in some detail. Browse through the table of contents and<br />

through the list of supplemental recipes on the book’s web site.<br />

• Before reading appropriate recipes, take a look at the chapter introduction and<br />

the first few recipes in the chapter for fundamental background on the topic.<br />

• Sometimes, we offer a general recipe providing an overview of possible solutions<br />

to a problem, and then more specific recipes for each solution. For example, we<br />

have a generic recipe on buffer overflows that helps you determine which technology<br />

is best for your application; then there are recipes covering specific technologies<br />

that couldn’t have been covered concisely in the overview.<br />

• If particular concepts are unclear, look them up in the glossary, which is available<br />

on the book’s web site.<br />

• Throughout each recipe, we detail potential “gotchas” that you should consider,<br />

so be sure to read recipes in their entirety.<br />

The book is divided into 13 chapters:<br />

Chapter 1, Safe Initialization, provides recipes for making sure your programs are in<br />

a secure state on startup and when calling out to other programs.<br />

Chapter 2, Access Control, shows how to manipulate files and directories in a secure<br />

manner. We demonstrate both the Unix permissions model and the Windows access<br />

control lists used to protect files and other resources.<br />

xx | Preface<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!