Java coding guidelines 75 recommendations for reliable and secure programs
"A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals i...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, N.J.
Addison-Wesley
2013, ©2014
|
Schriftenreihe: | The SEI series in software engineering
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047433701 | ||
003 | DE-627-1 | ||
005 | 20240228115354.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9780133439540 |c electronic bk. |9 978-0-13-343954-0 | ||
020 | |a 0133439542 |c electronic bk. |9 0-13-343954-2 | ||
020 | |a 9780133439526 |9 978-0-13-343952-6 | ||
035 | |a (DE-627-1)047433701 | ||
035 | |a (DE-599)KEP047433701 | ||
035 | |a (ORHE)9780133439526 | ||
035 | |a (DE-627-1)047433701 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.2/762 |2 23 | |
245 | 1 | 0 | |a Java coding guidelines |b 75 recommendations for reliable and secure programs |c Fred Long [and others] |
264 | 1 | |a Upper Saddle River, N.J. |b Addison-Wesley |c 2013, ©2014 | |
300 | |a 1 online resource (1 volume) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The SEI series in software engineering | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language. | ||
650 | 0 | |a Java (Computer program language) | |
650 | 0 | |a Computer programming | |
650 | 4 | |a Java (Langage de programmation) | |
650 | 4 | |a Programmation (Informatique) | |
650 | 4 | |a computer programming | |
650 | 4 | |a Computer programming | |
650 | 4 | |a Java (Computer program language) | |
700 | 1 | |a Long, Fred |d 1947- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780321933157 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780321933157 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780133439526/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047433701 |
---|---|
_version_ | 1818767343317155840 |
adam_text | |
any_adam_object | |
author2 | Long, Fred 1947- |
author2_role | ctb |
author2_variant | f l fl |
author_facet | Long, Fred 1947- |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047433701 (DE-599)KEP047433701 (ORHE)9780133439526 |
dewey-full | 005.2/762 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.2/762 |
dewey-search | 005.2/762 |
dewey-sort | 15.2 3762 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03342cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047433701</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115354.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133439540</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-13-343954-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133439542</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-13-343954-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133439526</subfield><subfield code="9">978-0-13-343952-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047433701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047433701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780133439526</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047433701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.2/762</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Java coding guidelines</subfield><subfield code="b">75 recommendations for reliable and secure programs</subfield><subfield code="c">Fred Long [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2013, ©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The SEI series in software engineering</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Fred</subfield><subfield code="d">1947-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780321933157</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780321933157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780133439526/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047433701 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:22Z |
institution | BVB |
isbn | 9780133439540 0133439542 9780133439526 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations. |
psigel | ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The SEI series in software engineering |
spelling | Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others] Upper Saddle River, N.J. Addison-Wesley 2013, ©2014 1 online resource (1 volume) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The SEI series in software engineering Includes bibliographical references and index. - Print version record "A must-read for all Java developers... Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals in mind." - Mary Ann Davidson, Chief Security Officer, Oracle Corporation Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure. Java Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Written by the same team that brought you The CERT® Oracle ® Secure Coding Standard for Java, this guide extends that previous work's expert security advice to address many additional quality attributes. You'll find 75 guidelines, each presented consistently and intuitively. For each guideline, conformance requirements are specified; for most, noncompliant code examples and compliant solutions are also offered. The authors explain when to apply each guideline and provide references to even more detailed information. Reflecting pioneering research on Java security, Java Coding Guidelines offers updated techniques for protecting against both deliberate attacks and other unexpected events. You'll find best practices for improving code reliability and clarity, and a full chapter exposing common misunderstandings that lead to suboptimal code. With a Foreword by James A. Gosling, Father of the Java Programming Language. Java (Computer program language) Computer programming Java (Langage de programmation) Programmation (Informatique) computer programming Long, Fred 1947- MitwirkendeR ctb 9780321933157 Erscheint auch als Druck-Ausgabe 9780321933157 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780133439526/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Java coding guidelines 75 recommendations for reliable and secure programs Java (Computer program language) Computer programming Java (Langage de programmation) Programmation (Informatique) computer programming |
title | Java coding guidelines 75 recommendations for reliable and secure programs |
title_auth | Java coding guidelines 75 recommendations for reliable and secure programs |
title_exact_search | Java coding guidelines 75 recommendations for reliable and secure programs |
title_full | Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others] |
title_fullStr | Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others] |
title_full_unstemmed | Java coding guidelines 75 recommendations for reliable and secure programs Fred Long [and others] |
title_short | Java coding guidelines |
title_sort | java coding guidelines 75 recommendations for reliable and secure programs |
title_sub | 75 recommendations for reliable and secure programs |
topic | Java (Computer program language) Computer programming Java (Langage de programmation) Programmation (Informatique) computer programming |
topic_facet | Java (Computer program language) Computer programming Java (Langage de programmation) Programmation (Informatique) computer programming |
url | https://learning.oreilly.com/library/view/-/9780133439526/?ar |
work_keys_str_mv | AT longfred javacodingguidelines75recommendationsforreliableandsecureprograms |