How to break software security : effective techniques for security testing / James A. Whittaker, Herbert H. Thompson.
Material type:
TextPublication details: Boston : Pearson/Addison Wesley, c2004.Description: xx, 185 p. : ill ; 24 cm.+ 1 CD-ROM (4 3/4 in.)ISBN: - 0321194330
- 9780321194336
- 005.8 21
- QA76.9.A25 W48 2004
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / WH.H 2004 (Browse shelf(Opens below)) | 1 | Available | 000792 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / VA.M 2010 Managing information security / | 005.8 / VA.N 2010 Network and system security / | 005.8 / WA.C 2008 CCNA security official exam certification guide / | 005.8 / WH.H 2004 How to break software security : | 005.8 / WH.M 2008 Management of information security / | 005.8 / WH.M 2008 Management of information security / | 005.8 / WH.M 2009 Principles of information security / |
Includes bibliographical references and index.
i introduction -- ii creating unanticipated user input scenarios -- 2 attacking software dependencies -- 3 breaking security through the user interface -- iii design and implementation attacks -- 4 attacking design -- 5 attacking implementation -- iv applying the attacks -- 6 putting it all together -- v conclusion -- 7 some parting advice -- appendices -- index.
How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM.
1
There are no comments on this title.