TY - BOOK AU - Whittaker,James A. AU - Thompson,Herbert H. TI - How to break software security : : effective techniques for security testing / SN - 0321194330 AV - QA76.9.A25 W48 2004 U1 - 005.8 21 PY - 2004/// CY - Boston : PB - Pearson/Addison Wesley, KW - CIT KW - Computer security KW - Computer software KW - Testing KW - Reliability N1 - Includes bibliographical references and index; i introduction -- ii creating unanticipated user input scenarios -- 2 attacking software dependencies -- 3 breaking security through the user interface -- iii design and implementation attacks -- 4 attacking design -- 5 attacking implementation -- iv applying the attacks -- 6 putting it all together -- v conclusion -- 7 some parting advice -- appendices -- index N2 - How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM ER -