Join us at Binding Hook Live on October 27 at Underbelly Boulevard Soho in London
Join us at Binding Hook Live

Secure Programming

This module explores secure programming, focusing on best practices and techniques for writing code that is robust against security vulnerabilities. It includes principles of secure coding, common security pitfalls, and methods for detecting and mitigating security flaws in software.

Portal > Cybersecurity > Secure Programming

Curriculum Builder

Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco, CA: No Starch Press, 2008.

McGraw, Gary. Software Security: Building Security In. Addison-Wesley Software Security Series. Upper Saddle River, NJ: Addison-Wesley, 2006.

Pressman, Roger S. Software Engineering: A Practitioner’s Approach. 8th ed. New York, NY: McGraw-Hill Education, 2014.

OWASP. “OWASP Foundation, the Open Source Foundation for Application Security | OWASP Foundation.”

https://owasp.org/

Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Addison-Wesley Software Security Series. Upper Saddle River, NJ: Addison-Wesley, 2007.

Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java. 1st ed. The SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley, 2011.

Basin, David, Patrick Schaller, and Michael Schläpfer. Applied Information Security: A Hands-on Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

https://doi.org/10.1007/978-3-642-24474-2

Howard, Michael, and David LeBlanc. Writing Secure Code, Second Edition. 2nd ed. Microsoft Press, 2003.

Viega, John, Gary McGraw, and Bruce Schneier. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley Professional Computing Series. Boston: Addison-Wesley, 2001.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco, CA: No Starch Press, 2008.

Thank you for applying! We will be in touch.

Apply for: Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco, CA: No Starch Press, 2008.

Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco, CA: No Starch Press, 2008.

Loading...

Loading…