Friday, January 9, 2009

The Dark Side of Game Texturing or Writing Secure Code

The Dark Side of Game Texturing

Author: David Franson

Charred ruins, bullet holes, rusted metal—if you're a fan of 3D first-person-shooter games, then you're familiar with those amazing, ominous textures that draw you into your character's surroundings. Get ready to analyze—and re-create—the textures and graphics used in these games. All you need is a decent PC, Photoshop, and a digital camera. Once you learn how to create the textures within this book, you can create any texture for any game. Not a born artist? That's okay. You'll learn how to let Photoshop do most of the work. Begin with texturing basics, including pixel sizes, color modes, and alpha channels. Then jump right into hearty texture tutorials as you create everything from sci-fi backgrounds and molten lava to medieval castle walls and dragon skin. If you're ready to travel to the grim back alleys of your imagination, then you're ready for "The Dark Side of Game Texturing".



New interesting textbook: Économie Directoriale :les Applications, les Stratégies et la Tactique

Writing Secure Code

Author: Michael Howard

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft(r) .NET security, and Microsoft ActiveX(r) development, plus practical checklists for developers, testers, and program managers.



Table of Contents:
Introduction
Pt. IContemporary Security
1The Need for Secure Systems3
2The Proactive Security Development Process23
3Security Principles to Live By51
4Threat Modeling69
Pt. IISecure Coding Techniques
5Public Enemy #1: The Buffer Overrun127
6Determining Appropriate Access Control171
7Running with Least Privilege207
8Cryptographic Foibles259
9Protecting Secret Data299
10All Input Is Evil!341
11Canonical Representation Issues363
12Database Input Issues397
13Web-Specific Input Issues413
14Internationalization Issues439
Pt. IIIEven More Secure Coding Techniques
15Socket Security455
16Securing RPC, ActiveX Controls, and DCOM477
17Protecting Against Denial of Service Attacks517
18Writing Secure .NET Code535
Pt. IVSpecial Topics
19Security Testing567
20Performing a Security Code Review615
21Secure Software Installation627
22Building Privacy into Your Application641
23General Good Practices663
24Writing Security Documentation and Error Messages695
Pt. VAppendixes
ADangerous APIs713
BRidiculous Excuses We've Heard723
CA Designer's Security Checklist729
DA Developer's Security Checklist731
EA Tester's Security Checklist737
A Final Thought739
Annotated Bibliography741
Index747

No comments:

Post a Comment