How to break software security : (Record no. 5202)
[ view plain ]
| 001 - CONTROL NUMBER | |
|---|---|
| control field | 13129168 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20200126093050.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 030319s2004 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2003048202 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0321194330 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780321194336 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u625 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | W48 2004 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 21 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Whittaker, James A., |
| Dates associated with a name | 1965- |
| 9 (RLIN) | 5559 |
| 245 10 - TITLE STATEMENT | |
| Title | How to break software security : |
| Remainder of title | effective techniques for security testing / |
| Statement of responsibility, etc. | James A. Whittaker, Herbert H. Thompson. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Pearson/Addison Wesley, |
| Date of publication, distribution, etc. | c2004. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xx, 185 p. : |
| Other physical details | ill ; |
| Dimensions | 24 cm.+ |
| Accompanying material | 1 CD-ROM (4 3/4 in.) |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | i introduction -- ii creating unanticipated user input scenarios -- 2 attacking software dependencies -- 3 breaking security through the user interface -- iii design and implementation attacks -- 4 attacking design -- 5 attacking implementation -- iv applying the attacks -- 6 putting it all together -- v conclusion -- 7 some parting advice -- appendices -- index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 12020 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer software |
| General subdivision | Testing. |
| 9 (RLIN) | 12021 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer software |
| General subdivision | Reliability. |
| 9 (RLIN) | 12022 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Thompson, Herbert H. |
| 9 (RLIN) | 1546 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / WH.H 2004 | 000792 | 11/24/2019 | 1 | 11/24/2019 | Books |