Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

i2d API 

IBM ProPolice 

IDs  2nd 

IFS environment variable 

Immunix FormatGuard 

Immunix StackGuard 

increment_nonce( ) 

incrementally hashing data 

information leakage 

initialization 

    security and 

initialization vectors  [See IVs]

input validation  2nd 

    basic data validation techniques 

    buffer overflows, preventing 

    data validation 

        vs. access control 

    SQL command strings and 

insecure random number generators 

int3 opcode 

integer coercion, preventing 

    signed-to-unsigned 

    size mismatches 

    unsigned-to-signed 

integer values, random collection of 

integrity checking

    cipher modes 

    messages 

integrity validation 

Intel conditionl branch instructions and their C comparison operators 

interleaving MACs (Message Authentication Codes) 

interprocess communication using sockets 

interprocess communications

    methods supported on different operating systems 

    sockets, using 

ios\:\:hex flag 

IP addresses

    restricting access based on 

    spoofing 

IsDebuggerPresent( ) 

IsDialogMessage( ) 

iteration counts, enhancing password security with 

    count size 

IVs (initialization vectors) 

    nonces, compared to 

    usage in CBC 

Категории