Fuzzing for software security testing and quality assurance / (Record no. 1074)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090707s2008 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008298533
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781596932142
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1989
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Takanen, Ari.
9 (RLIN) 3254
245 10 - TITLE STATEMENT
Title Fuzzing for software security testing and quality assurance /
Statement of responsibility, etc. Ari Takanen, Jared DeMott, Charlie Miller.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Norwood, MA :
Name of publisher, distributor, etc. Artech House,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 287 p. :
Other physical details ill. ;
Dimensions 27 cm.
490 0# - SERIES STATEMENT
Series statement Artech House information security and privacy series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Software Vulnerability Analysis -- Quality Assurance and Testing -- Fuzzing Metrics -- Building and Classifying Fuzzers -- Target Monitoring -- Advanced Fuzzing -- Fuzzer Comparison -- Fuzzing Case Studies -- Bibliography -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Fuzzing for Software Security Testing and Quality Assurance gives software developers a powerful new tool to build secure, high-quality software, and takes a weapon from the malicious hackers' arsenal. This practical resource helps developers think like a software cracker, so they can find and patch flaws in software before harmful viruses, worms, and Trojans can use these vulnerabilities to rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice that integrates seamlessly with all development activities. The book progresses through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also covers those cases where commercial tools fall short and developers need to build their own custom fuzzing tools.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 3255
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 3256
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Development.
9 (RLIN) 3257
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Demott, Jared D.
9 (RLIN) 3258
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, Charles,
Dates associated with a name 1951-
9 (RLIN) 1571
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE 1 005.8 / TA.F 2008 004388 12/20/2021 12/19/2021 1 11/24/2019 Books