How to break software security : (Record no. 5202)

MARC details
001 - CONTROL NUMBER
control field 13129168
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200126093050.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 030319s2004 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2003048202
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321194330
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321194336
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u625
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number W48 2004
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Whittaker, James A.,
Dates associated with a name 1965-
9 (RLIN) 5559
245 10 - TITLE STATEMENT
Title How to break software security :
Remainder of title effective techniques for security testing /
Statement of responsibility, etc. James A. Whittaker, Herbert H. Thompson.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. Pearson/Addison Wesley,
Date of publication, distribution, etc. c2004.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 185 p. :
Other physical details ill ;
Dimensions 24 cm.+
Accompanying material 1 CD-ROM (4 3/4 in.)
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note i introduction -- ii creating unanticipated user input scenarios -- 2 attacking software dependencies -- 3 breaking security through the user interface -- iii design and implementation attacks -- 4 attacking design -- 5 attacking implementation -- iv applying the attacks -- 6 putting it all together -- v conclusion -- 7 some parting advice -- appendices -- index.
520 ## - SUMMARY, ETC.
Summary, etc. How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 12020
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Testing.
9 (RLIN) 12021
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Reliability.
9 (RLIN) 12022
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Thompson, Herbert H.
9 (RLIN) 1546
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / WH.H 2004 000792 11/24/2019 1 11/24/2019 Books