Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. The authors explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.
Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up s...