Team LiB   Previous Section   Next Section

What This Book Does Not Cover

The following topics are outside the scope of this concise book. We generally do not supply:

Cookbook examples

Fine books have been written (and no doubt will continue to be written) that provide the reader with detailed examples of how to code securely in various programming languages. How can you open files securely? We talk about it. How can you do better than Kerberos 4 (first release) at random-number generation? We explain the problem. But we rarely show with a code excerpt how to do X in Y. That goal—a worthy one—was not what we set out to do. Indeed, we firmly believe that attempting to write secure software using nothing but examples (however good they are), while lacking the fundamental understanding of security we try to convey in this book, would be akin to trying to cook a great gourmet meal armed with nothing more than an ingredient list. While a great chef could certainly do just that, most people couldn't. The chef, you see, already has the fundamental skill of knowing how to cook food properly.

"How to [verb] the net-[noun] in [vendor-name] [product-name]"

You will find very few references here to specific operating systems, products, or utilities. Unless we need to clarify a concept, we avoid that territory. For one reason, it dates quickly. For another, there are many good books and magazines available already that fill that need. Most importantly, we believe that such specifics would distract you (and us) from the reflective thinking we all need to do.

In-depth application design issues

We agree that there is a need for a set of in-depth design guidelines and case studies spanning the entire development cycle of today's complex multitiered applications. Some of the topics might include the use of application service providers, discovery services, identity federation, single sign-on, and shared servers. We didn't take on that job, as we think it would require many more volumes to do it justice. We also have not tackled some recent complications in the network environment such as the emerging ubiquity of wireless communications.

Vulnerability exploit examples

While we discuss numerous software vulnerabilities in this book, we don't provide examples (well, we made one exception) of how to exploit them.

    Team LiB   Previous Section   Next Section