Logo

Secure Programming for Linux and Unix HOWTO

Secure Programming for Linux and Unix HOWTO
by

Description:
This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.

Home page url

Download or read it online for free here:
Download link
(700KB, PDF)

Similar books

Book cover: The Daemon, the Gnu, and the PenguinThe Daemon, the Gnu, and the Penguin
by - Reed Media Services
In addition to covering a history of free and open source, The Daemon, the Gnu, and the Penguin explores how free and open software is changing the world. It is authored by Peter Salus, a noted UNIX, open source, and Internet historian and author.
(10751 views)
Book cover: IBM Certification Study Guide AIX V4.3 System AdministrationIBM Certification Study Guide AIX V4.3 System Administration
by - IBM
This is a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators develop the knowledge and skills required for the certification.
(13848 views)
Book cover: Bourne Shell ScriptingBourne Shell Scripting
- Wikibooks
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
(8062 views)
Book cover: Filesystem Hierarchy StandardFilesystem Hierarchy Standard
by - Filesystem Hierarchy Standard Group
The filesystem standard has been designed to be used by Unix distribution developers, package developers, and system implementors. However, it is primarily intended to be a reference on how to manage a Unix filesystem or directory hierarchy.
(7402 views)