000 02140cam a2200325 a 4500
001 13129168
005 20200126093050.0
008 030319s2004 maua b 001 0 eng
010 _a2003048202
020 _a0321194330
020 _a9780321194336
035 _a(Sirsi) u625
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _apcc
050 0 0 _aQA76.9.A25
_b W48 2004
082 0 0 _a005.8
_2 21
100 1 _aWhittaker, James A.,
_d 1965-
_95559
245 1 0 _aHow to break software security :
_b effective techniques for security testing /
_c James A. Whittaker, Herbert H. Thompson.
260 _aBoston :
_b Pearson/Addison Wesley,
_c c2004.
300 _axx, 185 p. :
_b ill ;
_c 24 cm.+
_e 1 CD-ROM (4 3/4 in.)
504 _aIncludes bibliographical references and index.
505 0 _ai introduction -- ii creating unanticipated user input scenarios -- 2 attacking software dependencies -- 3 breaking security through the user interface -- iii design and implementation attacks -- 4 attacking design -- 5 attacking implementation -- iv applying the attacks -- 6 putting it all together -- v conclusion -- 7 some parting advice -- appendices -- index.
520 _aHow to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM.
630 0 0 _aCIT.
_914
650 0 _aComputer security.
_912020
650 0 _aComputer software
_x Testing.
_912021
650 0 _aComputer software
_x Reliability.
_912022
700 1 _aThompson, Herbert H.
_91546
596 _a1
999 _c5202
_d5202