The art of software security assessment : identifying and preventing software vulnerabilities /
"There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude."--Halvar Flake, CEO and head of research, SABRE Security GmbH Note: This is now a 2 volume set which is sh...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Addison Wesley Professional,
2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. Software vulnerability fundamentals
- 2. Design review
- 3. Operational review
- 4. Application review process
- 5. Memory corruption
- 6. C language issues
- 7. Program building blocks
- 8. Strings and metacharacters
- 9. UNIX I : privileges and files
- 10. UNIX II : processes
- 11. Windows I : objects and the file system
- 12. Windows II : interprocess communication
- 13. Synchronization and state
- 14. Network protocols
- 15. Firewalls
- 16. Network application protocols
- 17. Web applications
- 18. Web technologies.