11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Page 30• Preventing Automatic Submission With DypsAntiSpam• CAPTCHA: Examples• Using Database and ASP Sessions to Implement ASP Security• Step 1: Create A User Database Table• Step 2: Create And Configure The Virtual Directory• Step 3: Create The Sample Pages• Step 4: Add Validation Code To Pages• Protecting ASP Pages• Encoding ASP Code: Script Encoder• Protecting Passwords of ASP Pages with a One-way Hash Function• ASP Best Practices• ASP Best Practices: Error HandlingModule 17: <strong>Secure</strong> PERL Programming• Introduction: PERL• Common Terminology• Security Issues in Perl Scripts• Basic User Input Vulnerabilities• Overcoming Basic User Input Vulnerabilities• Insecure Environmental Variables• Algorithmic Complexity Attacks• Perl: Taint, Strict, and Warnings• Taint Mode• How Does Taint Mode Work?• Taint Checking• Using Tainted Data• Securing the Program Using Taint• Strict Pragmahttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!