menu
{ "item_title" : "A Tutorial on Java Socket Programming and Source Code Analysis", "item_author" : [" Meghanathan Natarajan "], "item_description" : "The book is organized into two modules: In the first module, we present a tutorial on socket programming in Java, illustrating complete examples for simplex and duplex communications with both connectionless datagram and connection-oriented stream-mode sockets. In addition, this module explains in detail, with examples, the differences between a concurrent server and iterative server and the use of the Multicast socket API. In the second module, we present the source code analysis of a file reader connection-oriented server socket Java program, to illustrate the identification, impact analysis and solutions to remove the following important software security vulnerabilities: (1) Resource Injection, (2) Path Manipulation, (3) System Information Leak, (4) Denial of Service and (5) Unreleased Resource vulnerabilities. We analyze the reason for these vulnerabilities to occur in the program, discuss the impact of leaving them unattended, and propose solutions to remove each of these vulnerabilities from the program. The proposed solutions are very generic in nature, and can be suitably modified to correct any such vulnerabilities in software developed in any other programming language.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/65/931/445/3659314455_b.jpg", "price_data" : { "retail_price" : "52.92", "online_price" : "52.92", "our_price" : "52.92", "club_price" : "52.92", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
A Tutorial on Java Socket Programming and Source Code Analysis|Meghanathan Natarajan

A Tutorial on Java Socket Programming and Source Code Analysis

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

The book is organized into two modules: In the first module, we present a tutorial on socket programming in Java, illustrating complete examples for simplex and duplex communications with both connectionless datagram and connection-oriented stream-mode sockets. In addition, this module explains in detail, with examples, the differences between a concurrent server and iterative server and the use of the Multicast socket API. In the second module, we present the source code analysis of a file reader connection-oriented server socket Java program, to illustrate the identification, impact analysis and solutions to remove the following important software security vulnerabilities: (1) Resource Injection, (2) Path Manipulation, (3) System Information Leak, (4) Denial of Service and (5) Unreleased Resource vulnerabilities. We analyze the reason for these vulnerabilities to occur in the program, discuss the impact of leaving them unattended, and propose solutions to remove each of these vulnerabilities from the program. The proposed solutions are very generic in nature, and can be suitably modified to correct any such vulnerabilities in software developed in any other programming language.

This item is Non-Returnable

Details

  • ISBN-13: 9783659314452
  • ISBN-10: 3659314455
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: December 2012
  • Dimensions: 9 x 6 x 0.19 inches
  • Shipping Weight: 0.28 pounds
  • Page Count: 80

Related Categories

You May Also Like...

    1

BAM Customer Reviews