ABSTRACT

This chapter looks at various contributors to insecure code. These range from cases of simple misinformation to simple forgetfulness. Many common scenarios are shown that can be identified and changed to better practices and habits.