Goodreads helps you keep track of books you want to read.
Start by marking “Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World” as Want to Read:
Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World
Enlarge cover
Rate this book
Clear rating
Open Preview

Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World

3.94  ·  Rating details ·  287 Ratings  ·  7 Reviews
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process--from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven ...more
ebook, 800 pages
Published December 1st 2004 by Microsoft Press (first published 2001)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Writing Secure Code, please sign up.

Be the first to ask a question about Writing Secure Code

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Krishna Kumar
May 04, 2015 rated it really liked it  ·  review of another edition
An authoritative reference to addressing security needs. It is meant as a guide for software developers as opposed to security for system administrators. You will learn many of the tricks that hackers employ, how not to write code that they can exploit and also some of the common myths about code security. There is a lot about C/C++ code exploits, but there is much material for programmers in other languages and platforms. It is a very long book.
Sorin Manole
Regardless of the fact that much of the information and examples is only applicable to Windows programming, this book puts forward some very good ideas that should be part of the common sense of every programmer. I liked some chapters that presented information that was new to me like Threat Modeling.
Matt Garden
Oct 05, 2012 rated it really liked it  ·  review of another edition
Very useful information on general security best practices. A lot of Windows code examples that I found less interesting (primarily doing Mac development) but that's obviously the author's expertise so it makes sense for it to be there.
Eric
Feb 23, 2012 rated it liked it  ·  review of another edition
The general advice within this book is sound. However, it spends quite a bit of time on specific ways to secure Windows applications running on XP and earlier versions of the OS. If you don't do that type of development, much of the advice in the book is no longer relevant.
Ibrahim Magdy
This book is good for coding (c++) securely but mainly under windows
j monty
Apr 13, 2007 rated it it was amazing  ·  review of another edition
This book is a great starting place for learning about avoiding common programming mistakes that create security vulnerabilities.
Vipul Pathak
Jul 19, 2013 rated it it was amazing  ·  review of another edition
Teaches you about secure coding practices. A must read for every programmer ...
Paul
rated it it was amazing
Sep 24, 2015
Suraj Dhungel
rated it it was amazing
Sep 03, 2016
Mayank Dhiman
rated it it was ok
Jul 12, 2015
Suraj V
rated it it was amazing
Aug 22, 2016
John Zhang
rated it did not like it
Apr 24, 2013
Jason Robarts
rated it really liked it
Apr 22, 2014
David
rated it liked it
Jan 15, 2010
Jeremy
rated it it was amazing
Mar 22, 2014
Muhammad Sohaib
rated it it was amazing
Sep 28, 2016
Paul Duncan
rated it really liked it
Dec 29, 2007
Pradeepa Deepika
rated it liked it
Oct 16, 2014
Alex
rated it really liked it
Mar 15, 2007
Gowri
rated it liked it
Oct 11, 2015
Sudonim
rated it really liked it
Aug 25, 2013
Veljko Krunic
rated it it was amazing
May 13, 2014
Yuri Krupenin
rated it liked it
Jun 16, 2011
Eric Bauman
rated it liked it
Jul 20, 2016
Rodger Brennan
rated it really liked it
May 05, 2015
Shahriar Chowdhury
rated it really liked it
Dec 26, 2014
Fapdaddy
rated it it was amazing
Sep 18, 2014
Ivan
rated it really liked it
Jan 02, 2017
Arif
rated it really liked it
Apr 04, 2016
Robert R. Jones
rated it liked it
Nov 07, 2014
« previous 1 3 4 5 6 7 8 9 10 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Software Estimation: Demystifying the Black Art
  • Reversing: Secrets of Reverse Engineering
  • Object-Oriented Analysis and Design with Applications
  • Code Reading: Open Source Perspective
  • Professional Excel Development: The Definitive Guide to Developing Applications Using Microsoft Excel and VBA
  • More Effective C++
  • Writing Solid Code
  • Modern C++ Design: Generic Programming and Design Patterns Applied
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Object Thinking
  • Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design
  • Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries
  • SQL in a Nutshell: A Desktop Quick Reference
  • Patterns of Enterprise Application Architecture
  • Practical Cryptography
  • Anti-Patterns: Refactoring Software, Architectures, and Projects in Crisis
  • Programming Windows
  • Design Patterns Explained: A New Perspective on Object-Oriented Design (Software Patterns Series)

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
software security expert from Microsoft
More about Michael Howard...

Share This Book

“All input is evil, until proven otherwise.” 0 likes
More quotes…