Secure coding in Java : serialization : LiveLessons / Robert C. Seacord.

By: Contributor(s): Series: LiveLessons (Indianapolis, Ind.)Publisher: [Place of publication not identified] : Addison-Wesley Professional : Pearson, [2018]Copyright date: (copy)2018Description: 1 online resource (1 streaming video file (3 hr., 31 min., 13 sec.)) : digital, sound, colorContent type:
  • two-dimensional moving image
Media type:
  • computer
  • video
Carrier type:
  • online resource
Other title:
  • Title on resource description page: Secure coding rules for Java : serialization
Subject(s): Genre/Form: LOC classification:
  • QA76.73.J38
Online resources: Speaker, Robert C. Seacord.Summary: "Secure coding expert, Robert C. Seacord trains developers to understand Java serialization and the inherent security risks. Seacord also demonstrates how to securely implement serializable classes and evaluate mitigation strategies and alternative solutions. Java deserialization is an insecure language features that is widely used both directly by applications and indirectly by Java modules and libraries. Deserialization of untrusted streams can result in remote code execution (RCE), denial-of service (DoS), and a range of other exploits. Applications can be vulnerable to these attacks even when they are free from coding defects."--Resource description page.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Speaker, Robert C. Seacord.

Title from title screen (viewed April 5, 2018).

"Secure coding expert, Robert C. Seacord trains developers to understand Java serialization and the inherent security risks. Seacord also demonstrates how to securely implement serializable classes and evaluate mitigation strategies and alternative solutions. Java deserialization is an insecure language features that is widely used both directly by applications and indirectly by Java modules and libraries. Deserialization of untrusted streams can result in remote code execution (RCE), denial-of service (DoS), and a range of other exploits. Applications can be vulnerable to these attacks even when they are free from coding defects."--Resource description page.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu