Chapter 12 Common Software Vulnerabilities and Countermeasures
Chapter 13 Defensive Coding Practices
Chapter 14 Secure Software Coding Operations