Java coding guidelines 75 recommendations for reliable and secure programs

"A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Long, Fred 1947- (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Upper Saddle River, N.J. Addison-Wesley 2013, ©2014
Schriftenreihe:The SEI series in software engineering
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047433701
003 DE-627-1
005 20240228115354.0
007 cr uuu---uuuuu
008 191023s2013 xx |||||o 00| ||eng c
020 |a 9780133439540  |c electronic bk.  |9 978-0-13-343954-0 
020 |a 0133439542  |c electronic bk.  |9 0-13-343954-2 
020 |a 9780133439526  |9 978-0-13-343952-6 
035 |a (DE-627-1)047433701 
035 |a (DE-599)KEP047433701 
035 |a (ORHE)9780133439526 
035 |a (DE-627-1)047433701 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.2/762  |2 23 
245 1 0 |a Java coding guidelines  |b 75 recommendations for reliable and secure programs  |c Fred Long [and others] 
264 1 |a Upper Saddle River, N.J.  |b Addison-Wesley  |c 2013, ©2014 
300 |a 1 online resource (1 volume)  |b illustrations. 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a The SEI series in software engineering 
500 |a Includes bibliographical references and index. - Print version record 
520 |a "A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language. 
650 0 |a Java (Computer program language) 
650 0 |a Computer programming 
650 4 |a Java (Langage de programmation) 
650 4 |a Programmation (Informatique) 
650 4 |a computer programming 
650 4 |a Computer programming 
650 4 |a Java (Computer program language) 
700 1 |a Long, Fred  |d 1947-  |e MitwirkendeR  |4 ctb 
776 1 |z 9780321933157 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9780321933157 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780133439526/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047433701
_version_ 1818767343317155840
adam_text
any_adam_object
author2 Long, Fred 1947-
author2_role ctb
author2_variant f l fl
author_facet Long, Fred 1947-
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047433701
(DE-599)KEP047433701
(ORHE)9780133439526
dewey-full 005.2/762
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.2/762
dewey-search 005.2/762
dewey-sort 15.2 3762
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03342cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047433701</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115354.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133439540</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-13-343954-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133439542</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-13-343954-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133439526</subfield><subfield code="9">978-0-13-343952-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047433701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047433701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780133439526</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047433701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.2/762</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Java coding guidelines</subfield><subfield code="b">75 recommendations for reliable and secure programs</subfield><subfield code="c">Fred Long [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2013, ©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The SEI series in software engineering</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Fred</subfield><subfield code="d">1947-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780321933157</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780321933157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780133439526/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047433701
illustrated Illustrated
indexdate 2024-12-18T08:48:22Z
institution BVB
isbn 9780133439540
0133439542
9780133439526
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations.
psigel ZDB-30-ORH
publishDate 2013
publishDateSearch 2013
publishDateSort 2013
publisher Addison-Wesley
record_format marc
series2 The SEI series in software engineering
spelling Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others]
Upper Saddle River, N.J. Addison-Wesley 2013, ©2014
1 online resource (1 volume) illustrations.
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
The SEI series in software engineering
Includes bibliographical references and index. - Print version record
"A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language.
Java (Computer program language)
Computer programming
Java (Langage de programmation)
Programmation (Informatique)
computer programming
Long, Fred 1947- MitwirkendeR ctb
9780321933157
Erscheint auch als Druck-Ausgabe 9780321933157
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780133439526/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Java coding guidelines 75 recommendations for reliable and secure programs
Java (Computer program language)
Computer programming
Java (Langage de programmation)
Programmation (Informatique)
computer programming
title Java coding guidelines 75 recommendations for reliable and secure programs
title_auth Java coding guidelines 75 recommendations for reliable and secure programs
title_exact_search Java coding guidelines 75 recommendations for reliable and secure programs
title_full Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others]
title_fullStr Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others]
title_full_unstemmed Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others]
title_short Java coding guidelines
title_sort java coding guidelines 75 recommendations for reliable and secure programs
title_sub 75 recommendations for reliable and secure programs
topic Java (Computer program language)
Computer programming
Java (Langage de programmation)
Programmation (Informatique)
computer programming
topic_facet Java (Computer program language)
Computer programming
Java (Langage de programmation)
Programmation (Informatique)
computer programming
url https://learning.oreilly.com/library/view/-/9780133439526/?ar
work_keys_str_mv AT longfred javacodingguidelines75recommendationsforreliableandsecureprograms