Đang chuẩn bị liên kết để tải về tài liệu:
Secure Programming for Linux and Unix HOWTO
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Specific guidelines for C, C++, Java, Perl, PHP, Python, Tcl, and Ada95 are included. For a current version of the book, | Secure Programming for Linux and Unix HOWTO David A. Wheeler Secure Programming for Linux and Unix HOWTO by David A. Wheeler v2.75 Edition Published v2.75 12 January 2001 Copyright 1999 2000 2001 by David A. Wheeler This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data web applications including CGI scripts network servers and setuid setgid programs. Specific guidelines for C C Java Perl Python TCL and Ada95 are included. This book is Copyright C 1999-2000 David A. Wheeler. Permission is granted to copy distribute and or modify this book under the terms of the GNU Free Documentation License GFDL Version 1.1 or any later version published by the Free Software Foundation with the invariant sections being About the Author with no Front-Cover Texts and no Back-Cover texts. A copy of the license is included in the section entitled GNU Free Documentation License . This book is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Table of Contents 1. Introduction.9 2. Background.13 2.1. History of Unix Linux and Open Source Free Software.13 2.1.1. Unix. 13 2.1.2. Free Software Foundation.14 2.1.3. Linux.14 2.1.4. Open Source Free Software.15 2.1.5. Comparing Linux and Unix.16 2.2. Security Principles.16 2.3. Is Open Source Good for Security .18 2.4. Types of Secure Programs.22 2.5. Paranoia is a Virtue.24 2.6. Why Did I Write This Document .24 2.7. Sources of Design and Implementation Guidelines.25 2.8. Other Sources of Security Information.28 2.9. Document Conventions.29 3. Summary of Linux and Unix Security Features.31 3.1. Processes.32 3.1.1. Process Attributes.33 3.1.2. POSIX Capabilities.34 3.1.3. Process Creation and Manipulation.35 3.2. Files.36 3.2.1. Filesystem Object Attributes.36 3.2.2. Creation Time Initial .