Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Software Architecture with C++

You're reading from  Software Architecture with C++

Product type Book
Published in Apr 2021
Publisher Packt
ISBN-13 9781838554590
Pages 540 pages
Edition 1st Edition
Languages
Authors (2):
Adrian Ostrowski Adrian Ostrowski
Profile icon Adrian Ostrowski
Piotr Gaczkowski Piotr Gaczkowski
Profile icon Piotr Gaczkowski
View More author details
Toc

Table of Contents (24) Chapters close

Preface 1. Section 1: Concepts and Components of Software Architecture
2. Importance of Software Architecture and Principles of Great Design 3. Architectural Styles 4. Functional and Nonfunctional Requirements 5. Section 2: The Design and Development of C++ Software
6. Architectural and System Design 7. Leveraging C++ Language Features 8. Design Patterns and C++ 9. Building and Packaging 10. Section 3: Architectural Quality Attributes
11. Writing Testable Code 12. Continuous Integration and Continuous Deployment 13. Security in Code and Deployment 14. Performance 15. Section 4: Cloud-Native Design Principles
16. Service-Oriented Architecture 17. Designing Microservices 18. Containers 19. Cloud-Native Design 20. Assessments 21. About Packt 22. Other Books You May Enjoy Appendix A

Common Vulnerabilities and Exposures

The first place to check for known security issues within software is the Common Vulnerabilities and Exposures (CVE) list available at https://cve.mitre.org/. The list is constantly updated by several institutions known as CVE Numbering Authorities (CNAs). These institutions include vendors and projects, vulnerability researchers, national and industry CERTs, and bug bounty programs.

The website also presents a search engine. With this, you can use several methods to learn about the vulnerabilities:

  • You can enter the vulnerability number. These are prefixed by CVE with examples including CVE-2014-6271, the infamous ShellShock, or CVE-2017-5715, also known as Spectre).
  • You can enter the vulnerability common name, such as the previously mentioned ShellShock or Spectre.
  • You can enter the name of the software you want to audit, such as Bash or Boost.

For each search result, you can see the description as well as a list of references to other bug...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}