Get Thinking

A detailed discussion of the following questions can be found in the "Appendix A" section on page 515.

Mull It Over

  1. What is a “secure” program?

  2. What input must be validated in a secure program? What sort of validation is required?

  3. How can you guard against attacks from the pool of trusted users?

  4. Where can an exploitable buffer overrun occur? What functions are particularly prone to buffer overrun?

  5. Can you avoid buffer overruns altogether?

  6. How can you secure the memory in use by your application?

  7. Are C and C++ inherently less secure than alternative languages?

  8. Has the experience of C led to C++ being a better, more securely designed language?

  9. How do you know when your program has been compromised?

Getting Personal

  1. What are the security requirements ...

Get Code Craft now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.