Читать книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen - Страница 36

Security and privacy

Оглавление

Together, these add up to the need for security and privacy to be part of the decision‐making in the development of software and hardware of devices at every stage and level. Security and privacy breaches are reported regularly on the news. Programmers must be ever vigilant to make sure that they write code in a “safe” way so as to ensure privacy and security. Will input provided to the code always be friendly, or could it be malicious? If input could arrive from an outside source (such as via the Internet), then you should assume that there will be malicious attacks. For example, for the C programming language, we recommend two wonderful books on this topic: Secure Coding in C and C++, second edition by Seacord, [Sea13], and C Programming: A Modern Approach, second edition, by King, [Kin08]. We discuss this more in Section 7.20.

Cryptography, Information Theory, and Error-Correction

Подняться наверх