Developer Forums | About Us | Site Map
Search  
HOME > AUTHORS > 25


Sponsors





Useful Lists

Web Host
site hosted by netplex

Online Manuals

David A. Wheeler

Company: Institute for Defense Analyses
E-mail address: dwheelerNOSPAM@dwheeler.com
Website address: http://www.dwheeler.com

David A. Wheeler is an expert in computer security and has long worked in improving development techniques for large and high-risk software systems. Mr. Wheeler is a validator for the Common Criteria. Mr. Wheeler also wrote the Springer-Verlag book Ada95: The Lovelace Tutorial, and is the co-author and lead editor of the IEEE book Software Inspection: An Industry Best Practice. This article presents the opinions of the author and does not necessarily represent the position of the Institute for Defense Analyses. You can contact David at dwheelerNOSPAM@dwheeler.com.

Articles:

This article discusses various ways data gets into your program, emphasizing how to deal appropriately with them; you might not even know about them all! It first discusses how to design your program to limit the ways data can get into your program, and how your design influences what is an input. It then discusses various input channels and what to do about them, including environment variables, files, file descriptors, the command line, the graphical user interface (GUI), network data, and miscellaneous inputs.


Read Tutorial   View Tutorial Discussion  

This article shows how to validate input -- one of the first lines of defense in any secure program.


Read Tutorial   View Tutorial Discussion  

This column explains how to write secure applications; it focuses on the Linux operating system, but many of the principles apply to any system. In today's networked world, software developers must know how to write secure programs, yet this information isn't widely known or taught. This first installment of the Secure programmer column introduces the basic ideas of how to write secure applications and discusses how to identify the security requirements for your specific application. Future installments will focus on different common vulnerabilities and how to prevent them.


Read Tutorial   View Tutorial Discussion  

Copyright 2004-2024 GrindingGears.com. All rights reserved.
Article copyright and all rights retained by the author.