Digital Cinematography
Author: Paul Wheeler
High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinematography essentials - from how to use the cameras to the rapidly emerging world of High Definition cinematography and 24p technology.
This book covers the 'on-the-set' knowledge you need to know - its emphasis lies in practical application, rather than descriptions of technologies, so that in this book you will find usable 'tools' and information to help you get the job done. From 'getting the look' to lighting styles and ratios, what is needed for different types of shoots and the technical preparation required, this is a complete reference to the knowledge and skills required to shoot high end digital films. The book also features a guide to the Sony DVW in-camera menus - showing how to set them up and how they work - a
device to save you time and frustration on set.
Paul Wheeler is a renowned cinematographer/director of photography and trainer, he runs courses on Digital Cinematography at the National Film & Television School and has lectured on the Royal College of Art's MA course and at The London International Film School. He has been twice nominated by BAFTA for a Best Cinematography award and also twice been the winner of the INDIE award for Best Digital Cinematography.
THE first step-by-step guide to high end digital camerawork
Keep up to date with the very latest technology
A practical 'on-the-set' guide that helps you get your job done
Books about: Introducción a EstadÃstica Comercial (con CD-ROM Estudiantil)
The 19 Deadly Sins of Software Security
Author: Michael Howard
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes:
- Windows, UNIX, Linux, and Mac OS X
- C, C++, C#, Java, PHP, Perl, and Visual Basic
- Web, small client, and smart-client applications
Michael Howard is a senior security program manager in the security engineering group at Microsoft Corporation, and a co-author of the award-winning Writing Secure Code. He is a co-author of Basic Training in IEEE Security and Privacy Magazine and a co-author of the National Cyber Security Task Force “Processes to produce Secure Software” document for the Department of Homeland Security. As an author of the Security Development Lifecycle, Michael spends most of his time is spent defining and enforcing security best practice and software development process improvements to deliver more secure software to normal humans.
David LeBlanc, Ph.D., is currently Chief Software Architect for Webroot Software. Prior to joining Webroot, he served as security architect for Microsoft's Office division, was a founding member of the Trustworthy Computing Initiative, and worked as a white-hat hacker in Microsoft's network security group. David is also co-author of Writing Secure Code and Assessing Network Security, as well as numerous articles. On good days, he'll be found ridingthe trails on his horse with his wife, Jennifer.
John Viega discovered the 19 deadly programming flaws that received such press and media attention, and this book is based on his discovery. He is the Founder and Chief Scientist of Secure Software(www.securesoftware.com), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly) an Adjuct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. He is the author or coauthor of nearly 80 technical publications, including numerous refered research papers and trade articles. He is coauthor of Building Secure Software, Network Security and Cryptography with OpenSSL and The Secure Programming Cookbook for C and C++.
Table of Contents:
1 | Buffer overruns | 1 |
2 | Format string problems | 17 |
3 | Integer overflows | 25 |
4 | SQL injection | 45 |
5 | Command injection | 63 |
6 | Failing to handle errors | 73 |
7 | Cross-site scripting | 83 |
8 | Failing to protect network traffic | 99 |
9 | Use of magic URLs and hidden form fields | 113 |
10 | Improper use of SSL and TLS | 125 |
11 | Use of weak password-based systems | 143 |
12 | Failing to store and protect data securely | 161 |
13 | Information leakage | 183 |
14 | Improper file access | 197 |
15 | Trusting network name resolution | 207 |
16 | Race conditions | 217 |
17 | Unauthenticated key exchange | 227 |
18 | Cryptographically strong random numbers | 235 |
19 | Poor usability | 247 |
A | Mapping the 19 deadly sins to the OWASP "top ten" | 261 |
B | Summary of do's and don'ts | 263 |
No comments:
Post a Comment