Secure Coding mailing list archives
Secure Coding Books
From: Jason.Bennett at thales-esecurity.com (Bennett, Jason)
Date: Wed, 12 Mar 2008 09:32:08 -0000
Hi All, With all the questions about what are good books are there any views on actually implementing the principles i.e. using them on real programmes to drive security improvement. In particular the contrast between exisitng programmes and new programmes? Consider the environment before printing this mail. "Thales e-Security Limited is incorporated in England and Wales with company registration number 2518805. Its registered office is located at 2 Dashwood Lang Road, The Bourne Business Park, Addlestone, Nr. Weybridge, Surrey KT15 2NX. The information contained in this e-mail is confidential. It may also be privileged. It is only intended for the stated addressee(s) and access to it by any other person is unauthorised. If you are not an addressee or the intended addressee, you must not disclose, copy, circulate or in any other way use or rely on the information contained in this e-mail. Such unauthorised use may be unlawful. If you have received this e-mail in error please delete it (and all copies) from your system, please also inform us immediately on +44 (0)1844 201800 or email postmaster at thales-esecurity.com. Commercial matters detailed or referred to in this e-mail are subject to a written contract signed for and on behalf of Thales e-Security Limited".
Current thread:
- Secure Coding Books Lawson, David L (Mar 07)
- Secure Coding Books Jim Manico (Mar 07)
- Secure Coding Books Sebastien Deleersnyder (Mar 08)
- Secure Coding Books Gary McGraw (Mar 10)
- Secure Coding Books Sebastien Deleersnyder (Mar 08)
- Secure Coding Books Goertzel, Karen [USA] (Mar 07)
- Secure Coding Books Neil Daswani (Mar 07)
- Secure Coding Books Robert C. Seacord (Mar 07)
- Secure Coding Books Dean H. Saxe (Mar 07)
- <Possible follow-ups>
- Secure Coding Books Bennett, Jason (Mar 12)
- Secure Coding Books Jim Manico (Mar 07)