Showing 1 - 10 of 10 results for the Author - fred long Secure Coding
In this report, the authors describe Android secure coding rules, guidelines, and static analysis developed as part of the Mobile SCALe project.
In this sample chapter, the authors describe how to avoid obscure techniques and code that is difficult to understand and maintain when programming in Java.
In this report, the authors describe the CERT Oracle Secure Coding Standard for Java, which provides guidelines for secure coding in Java.
In this book, the authors provide the first comprehensive compilation of code-level requirements for building secure systems in Java.
In this sample chapter, the authors provide rules, assesses their risk, and provide noncompliant and compliant code and solutions to validate and sanitize the data.
This report has been superseded by Specifications for Managed Strings, Second Edition (CMU/SEI-2010-TR-018).
In this report, the authors describe a managed string library for the C programming language.
In this report, Fred Long briefly describes potential software vulnerabilities in Java version 5.
In this 2007 report, the authors describe an extension to the C programming language to introduce the notion of ranged integers.
In this paper, the authors present a standard specification for managed strings.