An analysis of influence of safe programming techniques on applications efficiency and security
The topics covered in this article are the risks that must be taken into account when developing the software. This article gives you an overview of safeguards against some of the anticipated common security vulnerabilities. Based on the written programs, the impact of the various techniques of safe programming on the performance and security of the application has been analyzed. This article presents both a theoretical description of the protections as well as examples of their technical implementation.
programming; efficiency; security
 Sahel Alouneha, Mazen Kharbutlib, Rana AlQuremb, Procedia Computer Science, Volume 21, 2013, 250-256.
 Herbert Schildt, Java. Kompendium programisty. Wydanie IX, Helion, Gliwice, 2015
 Marcin Lis, Tworzenie bezpiecznych aplikacji internetowych, Helion, Gliwice, 2014.
 http://searchsecurity.techtarget.com/ [02-03-2017]
 J. C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen, Dave Aitel, Buffer Overflow Attacks, 2005, 161-228.
 J. Viega, M. Messier, C i C++. Bezpieczne programowanie. Receptury, Helion, Gliwice, 2011.
 N. Kalicharan, Java Zaawansowane zastosowania, Helion, Gliwice, 2014.
 Grande, J., Boudol, G., Serrano, M., Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, PPDP 2015, 149-160.
 V. Alessandrini, S. Memory, Application Programming, 2016, 83-99.
 Welsch, Y., Schäfer, J., Poetzsch-Heffter, A. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 471-500.
 Franz, M., Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12-22.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.